, ,

IoT password ban a start, but admins can’t afford to wait for regulators

The United Kingdom’s world-first ban on default and easily-guessable passwords for connected devices is a welcome step – but just the first toward securing the rapidly expanding landscape of the Internet of Things (IoT).

While outlawing passwords like “admin” and “12345” raises the security baseline, the legislation doesn’t go far enough in mandating firmware updates and built-in security capabilities. Enterprise admins must therefore remain vigilant against other glaring device loopholes in the smart office.

With IoT attacks quadrupling over the past five years, and the threat of IoT botnets only growing, admins can’t afford to wait for regulators. Here’s how they can tighten cybersecurity and regain control over their enterprise’s device ecosystem.

The war on weak passwords

This sort of ruling has been a long time coming for default passwords – and that’s because they’re extremely dangerous. Simple user-password combinations are easily guessable or crackable, turning devices into potential entry points or compromised online assets.

Recent research is sobering: attackers need only five common password sets to access an estimated 10% of all internet-connected devices. The Mirai malware, which hijacked over 100,000 home routers for massive distributed denial-of-service (DDoS) attacks, used just 62 username-password combinations.

This is an escalating issue. IoT botnets have emerged as a major DDoS traffic generator, with compromised devices disseminating malware, stealing data, and enabling other cyberattacks. The number of botnet-driven DDoS devices rose from around 200,000 last year to approximately 1 million today, accounting for over 40% of all such traffic.

Implemented in April, The UK’s Product Security and Telecommunications Infrastructure Act 2022 (PSTI) aims to address this by mandating that devices either have a randomized password or generate a unique one during initialization. Non-compliance is a criminal offense with penalties of up to £10 million or 4% of global revenue, whichever is higher.

For years, pundits expected market forces would compel device makers to improve password practices. But, without them stepping up, the government is stepping in and also instructing manufacturers to establish means for reporting security issues and detailing the timeline of security updates for their connected products.

Enterprises, don’t wait for regulators

This isn’t to say the act is perfect. For example, there are no specific rules that dictate the minimum timeline for reporting the above security updates. Worse, the standards lag behind comparable regions and regulations. The PSTI only meets 3 out of 13 IoT security guidelines from the European Telecommunications Standards Institute. Further, the regulation falls short of the more rigorous Cyber Resilience Act in Europe. This suite of connected device rules – slated for 2027 – goes a few steps further by mandating hardware and software support throughout the entire product lifecycle as well as automating updates.

Make no mistake, the PSTI is a positive step and tackling generic passwords is crucial. It’s also head and shoulders above the optional consumer checkmark solution put forward in the United States. But for enterprises operating today, regulations can only provide so much protection, and what they protect and how far they go will depend on where you are. The onus of achieving comprehensive protection ultimately falls on IT professionals to secure their connected device ecosystems.

This means adopting cutting-edge tools and best practices now. There are no excuses – unique credentials and multi-factor authentication are the minimum. Or, consider doing away with passwords altogether and opting for Public Key Infrastructure (PKI). This method uses asymmetric cryptography to establish an initial trust setting between the client and the target device, where a generated key replaces the password and grants authentication. Not only is this a far safer form of single-factor authentication, but it renders brute-force attacks impossible.

But that’s just the start. Rigorous asset discovery, network segmentation, and continuous monitoring are critical. Likewise, redouble efforts to lock down connections by encrypting all data in transit and ensuring direct peer-to-peer communication. Finally, don’t assume and always verify by following the principles of zero trust.

The future of secure devices is up to admins

The security imperative is immediate for admins. Don’t wait for slowly turning policy gears – the future of your connected infrastructure depends on decisive action today.

This begins with the basics like the above security controls. It also requires thinking critically about the device’s origins. Where does a given device come from? Who is the manufacturer and what are their security priorities and track record? These considerations can’t be dismissed in our landscape of pervasive supply chain risks.

Additionally, scrutinize the operating system and inner workings. Is it a full-fledged, high-end Linux distribution with a complex attack surface and potential backdoors? Or a real-time operating system (RTOS) purposely streamlined for the dedicated task? Admins must weigh whether the benefits of advanced capabilities justify the increased risk footprint. Simplicity and security restraint may be the wiser path for many IoT use cases.

It’s heartening to see regulators catch up with the stark cybersecurity realities of modern devices. Nonetheless, top-down mandates can only go so far as to protect you and your business. Ultimately, securing your connected future demands judicious device choices – rigorously vetting device origin, favoring secure-by-design architectures, and customizing the defaults. Until standards fully mature, you’re the last line of defense.

We've listed the best business password manager.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

https://www.techradar.com/pro/iot-password-ban-a-start-but-admins-cant-afford-to-wait-for-regulators


Leave a Reply

Your email address will not be published. Required fields are marked *

June 2024
M T W T F S S
 12
3456789
10111213141516
17181920212223
24252627282930

About Us

Welcome to encircle News! We are a cutting-edge technology news company that is dedicated to bringing you the latest and greatest in everything tech. From automobiles to drones, software to hardware, we’ve got you covered.

At encircle News, we believe that technology is more than just a tool, it’s a way of life. And we’re here to help you stay on top of all the latest trends and developments in this ever-evolving field. We know that technology is constantly changing, and that can be overwhelming, but we’re here to make it easy for you to keep up.

We’re a team of tech enthusiasts who are passionate about everything tech and love to share our knowledge with others. We believe that technology should be accessible to everyone, and we’re here to make sure it is. Our mission is to provide you with fun, engaging, and informative content that helps you to understand and embrace the latest technologies.

From the newest cars on the road to the latest drones taking to the skies, we’ve got you covered. We also dive deep into the world of software and hardware, bringing you the latest updates on everything from operating systems to processors.

So whether you’re a tech enthusiast, a business professional, or just someone who wants to stay up-to-date on the latest advancements in technology, encircle News is the place for you. Join us on this exciting journey and be a part of shaping the future.

Podcasts

TWiT 985: TikTok With Wings – AT&T Landlines, US Bans Kaspersky and DJI This Week in Tech (Audio)

AT&T Landlines, US Bans Kaspersky and DJI Microsoft delays Recall after security concerns, and asks Windows Insiders for help I just ordered the cheapest Surface Pro option – why I (probably) won't regret it Biden bans US sales of Kaspersky software over Russia ties The DJI Drone Ban: A Uniquely American Clusterf*ck Surgeon General: Social Media Platforms Need a Health Warning The Surgeon General Is Wrong. Social Media Doesn't Need Warning Labels LAUSD approves cellphone ban as Newsom calls for statewide action EU Council has withdrawn the vote on Chat Control US sues Adobe for hiding termination fees and making it difficult to cancel subscriptions Apple Won't Roll Out AI Tech In EU Market Over Regulatory Concerns AT&T can't hang up on landline phone customers, California agency rules Amazon mulls $5 to $10 monthly price tag for unprofitable Alexa service, AI revamp What Game of Thrones did to the media Elon Musk Tweeted a Thing This Old House' Pays Tribute to Creator Russell Morash Host: Leo Laporte Guests: Amanda Silberling, Louise Matsakis, and Ed Bott Download or subscribe to this show at https://twit.tv/shows/this-week-in-tech Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: NetSuite.com/TWIT eufy.com canary.tools/twit – use code: TWIT wix.com/studio expressvpn.com/twit
  1. TWiT 985: TikTok With Wings – AT&T Landlines, US Bans Kaspersky and DJI
  2. TWiT 984: Fifty-three Clicks – Bot Farms in Ukraine, LA Public Health Dept. Phished
  3. TWiT 983: Digital Snackwells – NVIDIA's Thor, Adobe's TOS, Insta's Unskippable Ads
  4. TWiT 982: International Trash – Startup Chaos, Breaking Ticketmaster, Ultrasonic Coffee
  5. TWiT 981: Grab Your Rabbit – Sky's voice, Copilot+ Surface devices, Car Thing's discontinuation