Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Too Many Smart Devices Have Dumbed-Down Security Protocols

Too Many Smart Devices Have Dumbed-Down Security Protocols

In both the home and the business, security cameras are becoming more and more commonplace as a means of preserving security. However, some malware can turn these devices, and others, into cyber security threats.

In October, 2016 the Mirai malware made headlines for doing just that. Utilized in the attack on Dyn, a company that hosts, manages, and maintains a substantial part of the Internet’s infrastructure, Mirai operates by attacking Internet of Things devices, gradually forming a botnet of zombified smartwatches, printers, and other Internet-connected “smart” devices to fuel a Distributed Denial of Service attack. These attacks essentially function by assaulting their target with so much traffic that the target shuts down. This brought down dozens of sites including Twitter, Netflix, Reddit, CNN, and many more in one of the largest-scale cyber attacks to date.

These DDoS attacks were once primarily powered by the familiar desktop computer, but with the boom in popularity of IoT devices, these devices are becoming a much more popular vehicle for the attacks.

This rise in popularity is due to a few factors. Firstly, the use IoT devices has been spreading both in popularity and in implementation, as was mentioned above. Therefore, zombifying them to be a part of a botnet boils down to basic tactics--there’s strength in numbers, so it makes more sense to utilize as many devices as possible. So, if there are seven IoT devices in a household that share one laptop, a botnet that utilizes on of the IoT devices will have six more devices at its disposal than it would have otherwise.

Secondly, there’s the matter of the security built into the devices themselves. How much thought would you think a manufacturer would put into the cyber security of a refrigerator? However, with refrigerators that now have “smart” features through Wi-Fi connectivity, cyber security is something that needs to be considered, and too often isn’t.

As an example that’s tinged with just a bit of irony, a security researcher decided to put the security of a particular IoT device to the test by monitoring a newly-purchased security camera. It took less than two minutes (closer to a minute and a half) for Mirai to infect the camera, despite the researcher’s precautions.

Unfortunately, there's little that a user can do to protect their IoT device from infection. However, the industry is gradually catching on and taking steps toward protecting these devices from external threats, so hopefully the trend of IoT botnets will be relatively short-lived. 

How many IoT devices do you own; and, what precautions do you take to keep them from being a hindrance to your network security? Share your story with us in the comments. 

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 30 January 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support IT Services Privacy Email Workplace Tips Computer Google Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Small Business Microsoft Backup Productivity Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Data Backup Android AI Data Recovery Upgrade Disaster Recovery VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Facebook Miscellaneous Holiday Automation Artificial Intelligence Information Gadgets Cloud Computing Training Covid-19 Compliance Server Managed Service Provider Remote Work Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Data Management Government Business Continuity Virtualization Wi-Fi Blockchain Business Technology Bandwidth Windows 10 Data Security Apps Two-factor Authentication Mobile Office Vendor Gmail Apple App Networking WiFi Managed Services Voice over Internet Protocol Employer-Employee Relationship BYOD Chrome Tip of the week Budget Mobile Device Management How To BDR Conferencing Computing Information Technology Hacker Office 365 Avoiding Downtime Access Control Marketing HIPAA Applications 2FA Managed IT Services Help Desk Big Data Operating System Healthcare Risk Management Computers Virtual Private Network Office Tips Analytics Health Website Augmented Reality Router Storage Password Retail Bring Your Own Device Scam Data loss Excel The Internet of Things Monitoring Going Green Social Patch Management Save Money Cybercrime Remote Workers Remote Monitoring Telephone Vulnerability End of Support Vendor Management Customer Service Physical Security Cooperation Free Resource Project Management Display Windows 7 Printer Paperless Office Microsoft 365 Infrastructure Solutions Document Management Firewall Windows 11 Maintenance Mobile Security Processor Antivirus Supply Chain Administration Safety Holidays Data Storage Smart Technology Video Conferencing Managed Services Provider Professional Services Settings Saving Time Virtual Machines Printing Wireless Content Filtering Robot Managed IT Service YouTube Customer Relationship Management Downloads iPhone Cryptocurrency Data Privacy IT Management Licensing VPN Meetings Vulnerabilities Entertainment Hacking Presentation Virtual Desktop Data storage LiFi Computer Repair Images 101 Wireless Technology Telephone System Multi-Factor Authentication Outlook Mobility Cost Management Money Humor Word Machine Learning Employees Integration Sports Mouse User Tip Modem Surveillance Displays Entrepreneur Virtual Assistant Twitter Mobile Computing Database Search IT Technicians Virtual Machine Error Medical IT Social Engineering Best Practice Proxy Server Reviews Cookies Outsourcing Cyber Monday Development Hotspot Transportation Remote Computing Buisness Undo Tactics Mirgation Hypervisor Workplace Legal IT solutions PowerPoint Business Growth Shopping Nanotechnology Optimization Hiring/Firing Tablet Language Employer/Employee Relationships Paperless Alert Addiction Cortana Management PCI DSS Managed IT Chatbots Co-managed IT File Sharing Navigation Dark Data How To Alt Codes Gig Economy Application Screen Reader Technology Care Distributed Denial of Service Internet Service Provider Computing Infrastructure Teamwork Business Communications Notifications Downtime Service Level Agreement IBM Regulations Compliance Identity Scams Travel Evernote Hosted Solution Typing Bookmark Techology Smart Tech Memes Hybrid Work Google Maps Download Net Neutrality Alerts SQL Server Human Resources Knowledge Financial Data History Cables Unified Threat Management Google Drive Break Fix Browsers Smartwatch Unified Threat Management Connectivity IT Competition Upload Procurement Azure Google Apps 5G Experience Social Network Telework Cyber security IT Maintenance Google Docs Multi-Factor Security Tech Network Congestion Unified Communications Dark Web Bitcoin Running Cable CES User Error IoT Communitications Business Intelligence Trends Supply Chain Management Shortcuts Google Wallet Customer Resource management FinTech User Regulations Ransmoware Point of Sale Google Calendar Term Microsoft Excel Windows 8 Laptop Data Analysis Star Wars IT Assessment Vendors Gamification Flexibility Network Management Staff Value Be Proactive Tech Support Drones IP Address Organization Social Networking Workforce Legislation Monitors Halloween Fileless Malware Digital Security Cameras Smart Devices Threats Content Remote Working Wearable Technology Memory Workplace Strategies Websites Health IT Recovery Motherboard Data Breach Meta Comparison Google Play Permissions Electronic Medical Records Hacks Scary Stories Directions Videos SharePoint Hard Drives Assessment Electronic Health Records Amazon Domains Wasting Time Fun Lenovo Trend Micro Outsource IT Specifications Security Cameras Writing Deep Learning Fraud Media Virtual Reality Microchip Refrigeration Internet Exlporer Software as a Service Environment Public Speaking Username Server Management Managing Costs Private Cloud Education Lithium-ion battery Superfish eCommerce Small Businesses Identity Theft Black Friday SSID

Blog Archive