• Skip to primary navigation
  • Skip to main content
  • Skip to footer
Logo of Agilient Security Consultants, Australia

Agilient Security Consultants Australia

Cybersecurity & Risk Management Specialists

Menu
  • Home
  • Industries
      • Aviation
      • Defence & Defence Industry
      • Government
      • Health & Hospitals
      • Corrections and Detention
      • Maritime
      • Aged Care Facilities
      • Mining, Oil & Gas
      • Public Venues & Events
      • Rail
      • Research and Education Industry
      • Telecommunications
      • Utilities
    • advice-colleagues-communication-newIndustries
  • Services
      • Cybersecurity
      • Protective Security
      • Business Resilience
      • Building Security Consultants
      • Security Audits
      • Pandemic Planning
      • Electronic Security
      • IT Disaster Recovery Plan
      • Security Consultants
      • CCTV and Security Cameras
      • Duress Alarms
      • Security Risk Assessment Consultants
      • Managed Security Service Provider
      • Protection against Vehicles as a Weapon
    • training-1Services
  • Solutions
    • banner-menuUnisys Solutions
    • CTO-Blog-110619-Header-GraphicLookingGlass Solutions
    • menu-bg-2Dell Technologies (RSA) Solutions
    • Sightline-Visualization-menuSightline Solutions
  • Resources
    • menumanagers-dealing-customer-agreTraining
    • working-together-newJoin The Tribe
    • Webinars_3-1.jpgUpcoming and Past Events
    • hacking-detected-shutterstock_newResources
  • Articles
  • About
    • About Us
      We are an Australian owned and operated security company specialising in risk, cybersecurity, protective security, crisis and business continuity management services.
    • frequently-asked-questions-smallFAQ’s
    • bg-menu-government-institutionsConsultant Registration
  • Contact Us
Contact Us

The Internet of Things – Cybersecurity Considerations

You are here: Home / Security News / The Internet of Things – Cybersecurity Considerations

The modern world is filling up with the Internet of Things (IoT).  From baby webcams that stream images of your sleeping child onto your phone while you’re away, to internet-linked fridges that can order food for you online – more and more mundane objects are becoming part of IoT.  While this means that our smart appliances can assist us in our day-to-day living, it also means that we are online in ways that we cannot perceive.  This can lead to cyber-criminals exploiting any ‘in’ to access our online data. fish tank

In one curious case, a prominent American casino was hacked in July 2018.  Hackers were alleged to have bypassed the casino’s cybersecurity systems by exploiting an unmonitored access point into the system.  The guilty unsecured access point was… a fish tank!  The thermostat used to regulate the temperature of the casino’s decorative fish tank had an unsecured Wi-Fi connection to the rest of the casino’s network, and this connection allowed hackers to access and move to other segments of the network to obtain the more important data they were seeking.

It seems comical that such a simple item could compromise an entire security network, but these kinds of oversights are not uncommon.  Other victims include a bank who had bought unsecured, Wi-Fi enabled security cameras that did not have come with any sort of firewall installed into their networking capabilities.  There are even children’s toys that allow apps to be downloaded onto networked devices without providing any firewall capability.

The danger for business lies in forgetting to double check if these small objects provide an unsecured entryway into your IT system when installed.  Employees might download apps on their work phones or laptops that may connect them to their smart homes or baby monitors, allowing hackers to access a company’s IT system from a completely random access point.  Likewise, anything and everything from coffee makers to thermostats should be firewall tested if they are to be connected to the company’s network.

The Internet of Things is so ubiquitous nowadays – we take for granted that smart software like Siri and Alexa can ‘do’ things for us at our request and, sometimes, without us even asking.  Understanding your IT, your installed hardware and your network as a whole will help plug up any unsecured holes in your IT security.  Ultimately, we will embrace this smart technology but we must do so with caution and common sense.

Don’t forget to follow our LinkedIn page for all the latest security updates, and Contact Us to see how we can assist your business.

Tweet
Share

Security News Alexa,  cybersecurity,  Internet of Things,  IoT,  Siri,  smart home,  smart technology

Looking for a security partner? Get in touch with Agilient.

Looking for practical and cost-effective security and risk solutions for your government department, agency or company? Speak with Australia’s leading senior security, risk and resilience experts.


Looking for a pandemic planning partner? Get in touch with Agilient.

Looking for practical and cost-effective risk management solutions for your government department, agency or company? Speak with Australia’s leading senior risk and emergency management experts.



Footer

Agilient is a proud member of

Ai Group Defence Council
Australian Industry & Defence Network
Australian Security Industry Association
Sydney Aerospace & Defence Interest Group

Company and Licensing Details:

ABN: 37 157 911 441
NSW Security Master Licence # 410783087
ACT Security Master Licence # 17502184
Vic Security Registration # 878-460-40S
Qld Security Firm Licence # 3834422

Join The Tribe

Sign up to receive our regular Agilient newsletter including the latest security, risk and resilience updates

Sign up now

Copyright © 2022 Agilient – Level 14, 275 Alfred St, North Sydney NSW 2060 Australia – 1300 341 692