The Online Trust Alliance has published a checklist of enterprise IoT security best practices. Ignore its advice at your own risk. Credit: Thinkstock Not so long ago, the phrase “consumerization of IT” was on everyone’s lips. Whole publications and conferences (remember CITE, for Consumerization of IT in the Enterprise?) were created to chronicle the trend of corporations relying on products and services originally created for consumers — which was often easier to use and of higher quality than its business-oriented competitors. Well, no one talks much about the consumerization of IT anymore… not because the trend went away, but because consumer tech has now permeated every aspect of business technology. Today, it’s just how things work — and if you ask me, that’s a good thing. The consumerization of enterprise IoT But now, in 2018, a variation of the concept is returning in the world of IoT, and it’s raising many of the same concerns around reliability and, especially, security. It turns out that in addition to the “enterprise grade” Internet of Things (IoT) devices they buy, corporate IT teams also have to deal with “consumer-grade” devices that may enter the company via a variety of channels, from non-IT company purchases to staff members bringing them in on their own. Examples include smart TVs, thermostats, smart speakers, fitness trackers, video cameras … basically anything connected to the company network that isn’t a computer, a phone, or a router. Not surprisingly, these devices often lack the comprehensive security features more commonly found on IoT products designed for enterprise use. Worse, perhaps, IT teams may not even be aware that these devices are being connected to their networks, much less be able to plan for their security. Online Trust Alliance IoT device checklist To help enterprises cope with these new vulnerabilities, the Online Trust Alliance, now an Internet Society initiative, has developed a checklist for dealing with these “consumerization of IoT” devices in enterprise environments. The OTA warns: Many have a simple or non-existent user interface, default (or hardcoded) passwords, open hardware and software ports, limited local password protection, lack the ability to be updated, “phone home” frequently, collect more data than expected and use insecure backend services. The consequences of using these devices range from unauthorized access to other enterprise systems, to surveillance via audio, video and data, to use of those devices to attack other connected devices or services. According to the OTA, enterprises must “fully consider the possible risks introduced by these devices, understand that IoT devices are likely more vulnerable than traditional IT devices, educate users on IoT device risks, and strike a balance between controlling IoT devices vs. creating “shadow IoT.” (That’s another buzz phrase that you don’t hear as much about these days.) Key IoT security checklist items Doing all that is hardly trivial, so while you can download a PDF of the entire checklist here, it’s worth calling out some of the key best practices. In addition to fairly obvious ones, such as products with hard-coded passwords, the checklist includes more-substantive advice: Relegate IoT devices to a “separate, firewalled, monitored network,” just as you would in guest networks. “This allows you to restrict incoming traffic, prevent crossover to your core network, and profile traffic to identify anomalies.” Turn off stuff that’s not being used. That may seem obvious, but the checklist also recommends the “physical blocking/covering of ports, cameras, and microphones.” Ensure that people can’t physically access these IoT devices to reset the passwords, etc. Enable encryption whenever possible, and consider allowing only devices that support encryption to connect to your networks. If that’s not possible, “consider using a VPN or other means to limit data exposure.” Keep firmware and software updated (via automatic updates or monthly checks). Avoid products that cannot be updated, follow the lifecycle of all devices, and remove them from service when they are no longer updatable or secure. IoT security continues to evolve, and checking off every item on the OTA list won’t provide complete protection. But these are straightforward best practices that can help mitigate the risk. Ignore them at your peril. Related content opinion 6 years of tech evolution, revolution and radical change In his farewell TechWatch post, Fredric Paul looks back at how technology has changed in the six years he’s been writing for Network World—and what to expect over the next six years. By Fredric Paul Sep 05, 2019 5 mins Small and Medium Business Internet Internet of Things feature Bluetooth finds a role in the industrial internet of things Market awareness and penetration, plus new technological advancements, are making Bluetooth—yes, Bluetooth—a key networking technology for the IIoT. By Fredric Paul Aug 30, 2019 5 mins Small and Medium Business Internet of Things Mobile opinion Top 5 IoT networking security mistakes IT supplier Brother International shares five of the most common internet-of-things security errors it sees among buyers of its printers and multi-function devices. By Fredric Paul Aug 26, 2019 3 mins Internet of Things Security opinion Don’t worry about shadow IT. Shadow IoT is much worse. Shadow IoT – the use of unauthorized internet of things devices and networks – poses a new level of threats for enterprises. By Fredric Paul Aug 22, 2019 4 mins Internet of Things Security Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe