Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Too Many Smart Devices Have Dumbed-Down Security Protocols

Too Many Smart Devices Have Dumbed-Down Security Protocols

In both the home and the business, security cameras are becoming more and more commonplace as a means of preserving security. However, some malware can turn these devices, and others, into cyber security threats.

In October, 2016 the Mirai malware made headlines for doing just that. Utilized in the attack on Dyn, a company that hosts, manages, and maintains a substantial part of the Internet’s infrastructure, Mirai operates by attacking Internet of Things devices, gradually forming a botnet of zombified smartwatches, printers, and other Internet-connected “smart” devices to fuel a Distributed Denial of Service attack. These attacks essentially function by assaulting their target with so much traffic that the target shuts down. This brought down dozens of sites including Twitter, Netflix, Reddit, CNN, and many more in one of the largest-scale cyber attacks to date.

These DDoS attacks were once primarily powered by the familiar desktop computer, but with the boom in popularity of IoT devices, these devices are becoming a much more popular vehicle for the attacks.

This rise in popularity is due to a few factors. Firstly, the use IoT devices has been spreading both in popularity and in implementation, as was mentioned above. Therefore, zombifying them to be a part of a botnet boils down to basic tactics--there’s strength in numbers, so it makes more sense to utilize as many devices as possible. So, if there are seven IoT devices in a household that share one laptop, a botnet that utilizes on of the IoT devices will have six more devices at its disposal than it would have otherwise.

Secondly, there’s the matter of the security built into the devices themselves. How much thought would you think a manufacturer would put into the cyber security of a refrigerator? However, with refrigerators that now have “smart” features through Wi-Fi connectivity, cyber security is something that needs to be considered, and too often isn’t.

As an example that’s tinged with just a bit of irony, a security researcher decided to put the security of a particular IoT device to the test by monitoring a newly-purchased security camera. It took less than two minutes (closer to a minute and a half) for Mirai to infect the camera, despite the researcher’s precautions.

Unfortunately, there's little that a user can do to protect their IoT device from infection. However, the industry is gradually catching on and taking steps toward protecting these devices from external threats, so hopefully the trend of IoT botnets will be relatively short-lived. 

How many IoT devices do you own; and, what precautions do you take to keep them from being a hindrance to your network security? Share your story with us in the comments. 

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 28 January 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support IT Services Privacy Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Small Business Microsoft Backup Productivity Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Data Backup Android AI Disaster Recovery Data Recovery Upgrade Business Management VoIP Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Facebook Holiday Miscellaneous Automation Information Artificial Intelligence Cloud Computing Covid-19 Training Gadgets Remote Work Compliance Server Managed Service Provider Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Windows 10 Office Government Data Management Business Continuity Bandwidth Virtualization Business Technology Wi-Fi Blockchain Windows 10 Apps Two-factor Authentication Mobile Office Data Security Vendor Gmail Budget BYOD WiFi Apple App Employer-Employee Relationship Tip of the week Managed Services Voice over Internet Protocol Networking Mobile Device Management Chrome Applications Access Control Conferencing Computing Hacker Information Technology Avoiding Downtime Marketing How To Office 365 BDR HIPAA 2FA Storage Password Bring Your Own Device Help Desk Big Data Virtual Private Network Health Operating System Computers Retail Risk Management Healthcare Website Managed IT Services Analytics Office Tips Router Augmented Reality Remote Monitoring Windows 11 End of Support Vulnerability Vendor Management Solutions The Internet of Things Excel Physical Security Monitoring Display Printer Social Paperless Office Infrastructure Going Green Telephone Document Management Customer Service Cybercrime Remote Workers Cooperation Scam Data loss Free Resource Project Management Windows 7 Firewall Patch Management Save Money Microsoft 365 Modem User Tip Processor Safety Mobile Security Sports IT Management Supply Chain Meetings Mouse Employees VPN Integration Administration Smart Technology Computer Repair Saving Time Holidays Data Storage Customer Relationship Management Managed IT Service Settings Video Conferencing Printing Managed Services Provider Downloads Wireless Machine Learning Data Privacy Virtual Machines Content Filtering Professional Services Hacking Licensing Presentation YouTube Entertainment Maintenance Cryptocurrency Wireless Technology Antivirus iPhone Virtual Desktop Telephone System Data storage Cost Management LiFi Vulnerabilities Word Outlook Images 101 Money Robot Multi-Factor Authentication Mobility Humor Entrepreneur Scary Stories Memory Username Hacks Remote Working Unified Threat Management Data Breach Black Friday Fun Google Play Small Businesses Unified Threat Management Displays Videos Database Deep Learning Electronic Health Records Wasting Time Undo IT Technicians Cookies Network Congestion Education Trend Micro Cyber Monday Security Cameras Outsourcing Proxy Server User Error Tactics Software as a Service Hotspot Managing Costs Workplace Mobile Computing Mirgation Hiring/Firing Point of Sale Nanotechnology eCommerce Search SSID Paperless Addiction Application Best Practice Surveillance Language Virtual Assistant Chatbots Buisness Virtual Machine Network Management Co-managed IT Management Tech Support Technology Care IBM Legal Reviews Screen Reader Monitors IT solutions Distributed Denial of Service Medical IT Transportation Business Communications Service Level Agreement Business Growth Development Computing Infrastructure Identity Hypervisor Scams Websites Hybrid Work Bookmark Shopping Smart Tech Optimization Cortana PowerPoint Employer/Employee Relationships SharePoint Human Resources Download Electronic Medical Records Alt Codes Alerts Competition PCI DSS Downtime Navigation Cables Browsers Gig Economy Connectivity Writing Hosted Solution Break Fix Lenovo Teamwork Google Apps Upload Virtual Reality Typing Internet Service Provider Regulations Compliance Multi-Factor Security Evernote Server Management IT Maintenance Social Network Private Cloud Business Intelligence Identity Theft Google Drive IoT User Memes Dark Web Knowledge Superfish SQL Server Shortcuts Trends Twitter Net Neutrality Financial Data Regulations History Google Calendar 5G Ransmoware Customer Resource management Error Vendors Data Analysis IP Address Google Docs Smartwatch Star Wars Social Engineering Unified Communications IT Microsoft Excel Experience Running Cable Azure Be Proactive Gamification Remote Computing Bitcoin Procurement Staff Google Wallet Telework Social Networking Cyber security Legislation Tech Workforce Threats Fileless Malware Tablet CES Recovery Communitications Laptop Workplace Strategies Content Alert Hard Drives Windows 8 Supply Chain Management Wearable Technology File Sharing Domains Drones FinTech Motherboard Dark Data Comparison Term Managed IT Meta Health IT Amazon Directions Assessment How To IT Assessment Permissions Halloween Value Notifications Refrigeration Flexibility Travel Public Speaking Organization Specifications Outsource IT Techology Environment Microchip Google Maps Lithium-ion battery Media Digital Security Cameras Internet Exlporer Smart Devices Fraud

Blog Archive