info(at)dizzrupt.nl

Blog Post

Edgar Versteeg • 21 June 2018

5 practical tips to improve your IoT security

The Internet of Things (IoT) dominates the headlines, and that is for a good reason. The technology is the accelerator for many exciting innovations and even new business models. But without the appropriate security measures, the IoT network is a feast for hackers and can become a nightmare. How do you keep your IoT network safe?

September 2016. A huge DDoS attack scares the world. Many temporarily lose access to the internet. The website of the well-known security journalist Brian Krebs also has to pay for it. The attacking 'bots' do not consist of servers and workstations, but of hundreds of thousands of IoT devices. The Internet of Things has lost its innocence since the large-scale 'Mirai botnet'. Everything with an IP address forms a potential attack weapon: webcams, routers, sensors and connected refrigerators.

This is a dangerous cocktail that hackers can and will use with great gratitude. Hacking corporate networks via IoT devices is no longer unthinkable. Just like performing DDoS attacks by your own IoT devices. The damage can run to millions of euros. Research by the Ponemon Institute in March this year and sponsored by Shared Assesment conducted under more than 600 respondents noted that 21% had suffered a data breach or cyber attack related to IoT. The study shows the rising concerns that a security incident related to unsecured IoT devices could be catastrophic. Quote: “In the next 24 months, more respondents believe their organizations will have a data breach and cyber attack caused by unsecured IoT devices or applications”.

As operational systems are become smarter as IoT devices are applied more and more. This has a great impact on the risk factor as it enlarges the attact vector of your enterprise. This however should not set you back to reap the benefits IoT devices bring to predictive maintenance for example.

Connected means vulnerable
A characteristic of this 'fourth industrial revolution' is that industrial systems are no longer 'stand-alone' but 'connected'. Through the (Industrial) Internet of Things they communicate with the users, with customers and with each other. This connection also makes the operational technology vulnerable to cyber attacks. Industrial Control Systems and SCADA networks have been compromised, just remind the Industroyer incident last year. This ‘new virus’ seemed specifically designed to lay down energy networks.

As the world is becoming smarter, the security of all those connected devices should also be checked as it often leaves room for improvement (understatement). Hackers can set up large-scale botnets with often simple hacks, last week reportby the NSCS shows that mostly the basics in cybersecurity still go wrong.

5 tips to improve your IoT security

  1. Update asset management processes and inventory systems to include IoT devices and applications, and understand the security characteristics of all inventoried devices. When devices are found to have inadequate IoT security controls, replace them. 

  2. Identify and assign accountability for approval, monitoring, use and deployment of IoT devices and applications within your organization. 

  3. Ensure that IoT devices, applications, and metrics are included, monitored and reported as part of your third-party risk management program. 

  4. Verify that specific third-party IoT related controls included in contract clauses, policies and procedures can be operationalized and monitored for adherence and compliance. 

  5. Collaborate with industry peers, colleagues, and experts to identify successful approaches, techniques, solutions and standards to monitor and mitigate third-party IoT device and application risks. 


In general you can take technical and organizational measures. Technical measures consist for example of continuous monitoring of network flows. If you who wants to abort a DDoS attack you must be able to identify suspicious deviations in network traffic as quickly as possible. A monitoring system is indispensable for this. If you use network services from a third party, it is advisable to inquire about the policy and contractual agreements regarding DDoS monitoring. Organizational measures are also very important to act proactive to prevent issues and to have an incident response plan in case of emergency. Therefore prepare an incident response plan, which accurately describes what everyone's tasks and responsibilities are in the event of a cyber incident. This prevents panic and increases decisiveness when a DDoS attack takes place. During the attack itself there is not always room to devise a good strategy. If you want advice or discuss further, don't hesitate and contactus.

The full Ponemon report can be found here.


#cybersecurity #IoT #DDoS #incident reponse #securityawareness #digitaltransformation


by Edgar Versteeg 12 March 2024
An growing online romance scam named as pig butchering explained
by Edgar Versteeg 12 October 2023
"Driving the Shift from an Analog to Digital business model in mobility"
by Edgar Versteeg 17 September 2021
"How to make small and medium enterprises aware of the power of cybersecurity"
by Edgar Versteeg 25 November 2020
How to trigger consumers and prosumer to rethink their relationship with energy?
by Edgar Versteeg 14 February 2024
In February 2019 I was asked to provide a keynote to the staff of DIQQ and Q-GRP about the potential of blockchain technology. Below is a short summary of my talk. What is blockchain, and what are the benefits? In my view, the power of blockchain consists of three elements. Blockchain is a new technology that enables participants in a distributed network to securely exchange data. Network security is protected by applying cryptography. A well-known definition is a shared ledger containing all network transactions, accessible to everyone. This database offers maximum transparency, unlike other databases that are often shielded. Data and network security are maintained through cryptography, making it impossible to hack a blockchain or manipulate data. Today, cybersecurity is a significant concern, and when you look at well-known hacks (e.g., Mt Gox), you'll see that hackers targeted the exchange platform or wallet but not the blockchain technology itself. Blockchain technology lacks value without an ecosystem for sharing data. Its strength lies in being open-source technology, allowing anyone to contribute to the ecosystem. Additionally, in the decentralized network, peer-to-peer exchange of 'data' or 'value' is possible, a particularly powerful feature. No central authority or middleman is required, allowing for significant efficiency gains. Moreover, crypto-economics or game theory plays a crucial role in blockchain. This involves protecting the network by considering 'rules' and 'adversarial thinking' (‘What could participants do to disrupt the network?’). Designing the ecosystem and desired and undesired behaviors among all (decentralized) participants can be encoded using incentive mechanisms (tokenization and smart contracts), which holds great potential. The interplay between a well-designed ecosystem, game theory's design patterns, and applying cryptography to concrete customer needs or use cases determine blockchain's success. Blockchain in Practice Blockchain is a powerful technology applicable in various forms, often combined with existing technology. Experimentation with various blockchain applications is underway worldwide, focusing on creating value for customers and sharing information transparently and efficiently with chain partners. A well-known example is bitcoin, which can be viewed as an alternative economic system. The bitcoin network is supported by participants, with cryptography protecting the network and facilitating value transfer. Unlike the euro, there is no central party influencing the operation of bitcoin or the ecosystem. This brings several benefits. However, the governance of a blockchain ecosystem is crucial to prevent undesirable behavior, given the atmosphere of 'get rich quick' schemes and fraud surrounding crypto. Worldwide experimentation with blockchain applications is ongoing, with the potential to significantly disrupt existing platforms like Uber, Netflix, and Facebook. Smart Contract A smart contract involves programming transactions occurring on a blockchain. A blockchain can carry value (e.g., bitcoin), which is automatically disbursed when a transaction meets certain conditions. This means processes in the financial, legal, and logistics sectors can be significantly optimized, requiring fewer human interventions to monitor network transactions. Many startups and corporates are developing blockchain applications with the potential to have a substantial impact on the increasingly digitized world. Maturity Blockchain technology is still in its infancy. After the hype in 2017 and early 2018, things have settled down. Blockchain's strength lies in its ability to carry value (e.g., a cryptocurrency) and program desired behavior in the ecosystem, such as tokenization and the application of smart contracts. Although the value of various cryptocurrencies like bitcoin has significantly declined recently, many companies continue to experiment with blockchain technology with conviction. In short, the technology is still evolving, and finding the right use cases or product-market combination remains a challenge. In my role as a product owner, this is what makes my work so challenging! The full article can be read [In Dutch] on the DIQQ website
by Edgar Versteeg 19 August 2019
In the past months, there were some interesting markers which I would like to share with you which could potentially indicate fundamental changes in the blockchain ecosystem.
by Edgar Versteeg 18 April 2019
Winner of the 2nd prize in the hackathon focused on the inclusive finance
by Edgar Versteeg 11 April 2019
Trends around blockchain that steer the automotive industry
by Edgar Versteeg 18 March 2019
Test your online security awareness
by Edgar Versteeg 11 July 2018
Cybersecurity is an essential element to take care of building your startup or enterprise. Read my top 5 recommendations to start with today when it comes to security measures for start-ups.
More posts
Share by: