{"id":26403,"date":"2017-04-14T13:00:38","date_gmt":"2017-04-14T20:00:38","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=26403"},"modified":"2017-04-17T10:01:06","modified_gmt":"2017-04-17T17:01:06","slug":"iot-counting-steps","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2017\/04\/iot-counting-steps\/","title":{"rendered":"IoT: Who Is Counting Your Steps?"},"content":{"rendered":"<p>Should your fitness-tracking IoT device be secured? I mean, who really cares how many steps you took today or how many calories that banana smoothie really had\u2026right?<\/p>\n<p>In a world where all devices are connected and share different levels of information between them, we need to assume that every connection can be used as a back door, even if the information on the targeted device is seemingly useless. It\u2019s very difficult to predict what obscure data a hacker might find useful or what new pathway they may discover through unprotected devices.<\/p>\n<p>For service providers that are managing a complex and diverse IoT environment, assuming an application or device is not critical and does not need to be secured can prove to be a huge mistake.<\/p>\n<p>Sometimes the criticality of the solution clearly justifies the need for high security. A medical device (i.e., an insulin pump connected to the cloud application that monitors blood sugar) \u2013 based on the statistical reading of the device \u2013 will determine the quantity of insulin to administer. That is high in criticality and risk because if it fails, that puts someone\u2019s life in danger. Hence, logic would determine this solution\/application needs to be secured in every possible way.<\/p>\n<p>But not every case is as obvious as a medical device. IoT developers have in the past misjudged how hackers can leverage \u201cuseless\u201d information or connections for their own advantage. For example, when a major automotive brand rolled out an infotainment system for its signature vehicles, the logic behind its determination that it did not need to be secured was: This is a system that will only read information from the car and provide a \u201chealth analysis\u201d to the car owner and service agency. <a href=\"https:\/\/www.wired.com\/2016\/08\/jeep-hackers-return-high-speed-steering-acceleration-hacks\/\" rel=\"nofollow,noopener\" >This was true until it wasn\u2019t.<\/a><\/p>\n<p>The moment hackers learned that uConnect gave backdoor internet connectivity to a car\u2019s operating system, it became only a matter of time for them to develop a tunnel that granted control to the car\u2019s entire driving system. The case saw significant media coverage, as hackers were already gaining control of the car\u2019s steering and breaking systems. Since then, <a href=\"https:\/\/www.dataprivacymonitor.com\/cybersecurity\/legal-developments-in-connected-car-arena-provide-glimpse-of-privacy-and-data-security-regulation-in-internet-of-things\/\" rel=\"nofollow,noopener\" >regulations require IoT cars to be internet-connected based on its criticality.<\/a><\/p>\n<p>Recently, <a href=\"https:\/\/arstechnica.com\/security\/2017\/03\/smart-tv-hack-embeds-attack-code-into-broadcast-signal-no-access-required\/\" rel=\"nofollow,noopener\" >researchers demonstrated<\/a> a new attack that could use terrestrial radio signals to hack a wide range of smart TVs, raising an unsettling prospect: the ability of hackers to take complete control of a large number of sets at once without having physical access to any of them.<\/p>\n<p>So, what does any of this have to do with your IoT fitness tracking device?<\/p>\n<p>The interconnectedness of devices in the IoT era creates vulnerabilities that the creators of the individual devices could easily overlook. What happens when you get in to your connected vehicle, and connect your unsecured fitness tracking device to your car using a Bluetooth signal? Are you opening a back door to your car\u2019s operating system? If hackers can access and control your IoT-connected fitness device, then they could certainly gain access to other devices through Bluetooth, WiFi or other device-to-device connections.<\/p>\n<p>Some of these ideas may seem far-fetched, but your device will eventually be connected to other types of services on its ecosystem; the application that monitors the device and connects it to a cloud application might as well be connected to other sensitive information, such as billing (with credit card numbers), addresses, locations or other things users would not share so willingly.<\/p>\n<p>To secure every single device and application in an ecosystem that is not standardized in any way or form, and that may use a plethora of different devices, operating systems and capabilities, a comprehensive, consistent platform \u2013 not a one-off solution \u2013 is required.This is is possible when service providers offer network-based security, which is of paramount importance in an age of hyper-connectivity.<\/p>\n<p><strong>Learn more by downloading our white paper: <a href=\"https:\/\/www.paloaltonetworks.com\/apps\/pan\/public\/downloadResource?pagePath=\/content\/pan\/en_US\/resources\/whitepapers\/protect-iot-opportunity-network-based-security\">Protect IOT Opportunity With Network-Based Security<\/a><\/strong><\/p>\n<p><a href=\"http:\/\/go.paloaltonetworks.com\/ignite2017\"><div style=\"max-width:100%\" data-width=\"820\"><span class=\"ar-custom\" style=\"padding-bottom:41.46%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignnone wp-image-25356 size-full lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/03\/ignite17-social-cover-img-facebook-820x340.png\" alt=\"ignite17-social-cover-img-facebook-820x340\" width=\"820\" height=\"340\" \/><\/span><\/div><\/a><\/p>\n<p><strong>Ignite \u201917 Security Conference: Vancouver, BC June 12\u201315, 2017<\/strong><\/p>\n<p>Ignite \u201917 Security Conference is a live, four-day conference designed for today\u2019s security professionals. Hear from innovators and experts, gain real-world skills through hands-on sessions and interactive workshops, and find out how breach prevention is changing the security industry. Visit the <a href=\"http:\/\/www.paloaltonetworksignite.com\" rel=\"nofollow,noopener\" >Ignite website<\/a> for more information on tracks, workshops and marquee sessions.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Should your fitness-tracking IoT device be secured? We think so.<\/p>\n","protected":false},"author":342,"featured_media":21531,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1097],"tags":[510,3486,937],"coauthors":[3564],"class_list":["post-26403","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-service-providers","tag-iot","tag-mobile-network-operators","tag-service-provider"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/11\/blog-generic-banner-1.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/26403","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/342"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=26403"}],"version-history":[{"count":4,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/26403\/revisions"}],"predecessor-version":[{"id":26457,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/26403\/revisions\/26457"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/21531"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=26403"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=26403"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=26403"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=26403"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}