ILMA Compoundings – October 2019 - 40

BUSINESS HUB

Internet of Things
By Bryce Austin

M

any of the products we
purchase today are not just
products. Twenty years ago,
if you went into a store and bought
a thermostat, you got exactly that: a
thermostat. It controlled your heat and/
or air conditioning and had no ability
to do anything else. It wasn't a concern
beyond its ability to accurately run
your heating or cooling system.
Today, a thermostat is not just
a thermostat. It's a computer that
happens to be hooked up to temperature sensors and is programmed to
control a furnace and air conditioner.
Computers can be reprogrammed
to do other things. Computers need
to be protected from criminals who
would try to make them do what the
criminal wants rather than what you
want. The internet-connected thermostat, television, security camera, coffee
maker, lightbulb, juicer, refrigerator,
washing machine and other devices
are now all computers. They all have
the potential to be attacked, just like
your desktop or laptop.
Given the potential damage that
these devices can do, the definition of
an internet-of-things (IoT) device is
important to understand. Differences
of opinion exist on this, so I'm going
to focus on the ones that meet the
following criteria. For a device to be
considered an IoT device, three conditions must be met. An IoT device must:
1. Have a computer as its "brain."
By definition, almost anything
with the ability to communicate
with other computers is also a
computer.
2. Be connected to the internet. If
you hook it up to a networking

40

OCTOBER 2019

| COMPOUNDINGS | ILMA.ORG

cable or connect it to a Wi-Fi
network, and that network can
see external websites like Google,
then this condition applies.
3. Be capable of receiving data. If a
device can only send information
and has been set up to be incapable of receiving it, then it cannot
be remotely controlled.
So, what are some of the ways
IoT devices can be used against your
organization?
1. They can be used as an entry
point into your network. Without good network segmentation
and good firewall rules, a hacked
IoT device can be used as a
means for a hacker to probe your
network for vulnerabilities.
2. IoT devices might be giving away
sensitive data, network passwords
or even your critical intellectual
property without you knowing
about it. Some of these devices
are so poorly designed that they
are broadcasting the "keys to your
technology kingdom," such as
your Wi-Fi password.
What are your company's chances
of being targeted? According to a
Gartner forecast, 8.4 billion connected things were expected to be in
use worldwide in 2017 - an increase
of 31% from 2016. While consumers
are the largest group of IoT users,
representing 63% of overall IoT
applications as of 2017, businesses
were expected to employ 3.1 billion
connected things that year. 
So, what steps can your company
take to secure your IoT devices?

1. Segregate these devices onto their
own section of your network.
2. Avoid IoT devices that collect
sensitive data. This list is larger
than you might think. Most
smart thermostats have motion
sensors and know when there are
people in your office and when
there aren't. Criminals would like
to know that, too.
3. Make sure IoT devices provide
a genuine business value before
allowing them into your environment. A casino in North America
was recently hacked through its
IoT-connected fish tank. Do you
think that casino really needed an
IoT aquarium?
Look for IoT devices that have
been made with a cybersecurity
framework in mind, such
as the IIConsortium
(www.iiconsortium.org) or Z-Wave
(products.z-wavealliance.org).
Austin is the CEO of TCE
Strategy, an internationally
recognized speaker on emerging
technology and cybersecurity
issues, and author of Secure Enough? 20
Questions on Cybersecurity for Business
Owners and Executives. With over 10 years of
experience as a chief information officer and chief
information security officer, Austin actively advises
companies across a wide variety of industries on
effective methods to mitigate cyberthreats. For
more information, visit www.tcestrategy.com.
Adapted from an excerpt in
Austin's book, Secure Enough? 20
Questions on Cybersecurity for
Business Owners and Executives.


http://www.iiconsortium.org http://products.z-wavealliance.org http://www.tcestrategy.com http://www.ILMA.ORG

ILMA Compoundings – October 2019

Table of Contents for the Digital Edition of ILMA Compoundings – October 2019

LETTER FROM THE PRESIDENT
LETTER FROM THE CEO
INSIDE ILMA
WHAT’S COMING UP
NEW MEMBERS
INDUSTRY RUNDOWN
In the Know
International Insight
Market Report
THE ART OF APPRENTICESHIPS
SPEAKING A DIFFERENT LANGUAGE
ANNUAL MEETING SPEAKER SPOTLIGHT
BUSINESS HUB
COUNSEL COMPOUND
WASHINGTON LANDSCAPE
IN NETWORK
Member Connections
Cross Connections
PORTRAIT
ILMA Compoundings – October 2019 - Cover1
ILMA Compoundings – October 2019 - Cover2
ILMA Compoundings – October 2019 - 1
ILMA Compoundings – October 2019 - 2
ILMA Compoundings – October 2019 - 3
ILMA Compoundings – October 2019 - 4
ILMA Compoundings – October 2019 - LETTER FROM THE PRESIDENT
ILMA Compoundings – October 2019 - 6
ILMA Compoundings – October 2019 - LETTER FROM THE CEO
ILMA Compoundings – October 2019 - 8
ILMA Compoundings – October 2019 - 9
ILMA Compoundings – October 2019 - INSIDE ILMA
ILMA Compoundings – October 2019 - 11
ILMA Compoundings – October 2019 - WHAT’S COMING UP
ILMA Compoundings – October 2019 - 13
ILMA Compoundings – October 2019 - 14
ILMA Compoundings – October 2019 - NEW MEMBERS
ILMA Compoundings – October 2019 - INDUSTRY RUNDOWN
ILMA Compoundings – October 2019 - 17
ILMA Compoundings – October 2019 - 18
ILMA Compoundings – October 2019 - In the Know
ILMA Compoundings – October 2019 - International Insight
ILMA Compoundings – October 2019 - 21
ILMA Compoundings – October 2019 - 22
ILMA Compoundings – October 2019 - 23
ILMA Compoundings – October 2019 - Market Report
ILMA Compoundings – October 2019 - 25
ILMA Compoundings – October 2019 - THE ART OF APPRENTICESHIPS
ILMA Compoundings – October 2019 - 27
ILMA Compoundings – October 2019 - 28
ILMA Compoundings – October 2019 - 29
ILMA Compoundings – October 2019 - 30
ILMA Compoundings – October 2019 - 31
ILMA Compoundings – October 2019 - SPEAKING A DIFFERENT LANGUAGE
ILMA Compoundings – October 2019 - 33
ILMA Compoundings – October 2019 - 34
ILMA Compoundings – October 2019 - 35
ILMA Compoundings – October 2019 - 36
ILMA Compoundings – October 2019 - 37
ILMA Compoundings – October 2019 - ANNUAL MEETING SPEAKER SPOTLIGHT
ILMA Compoundings – October 2019 - 39
ILMA Compoundings – October 2019 - BUSINESS HUB
ILMA Compoundings – October 2019 - 41
ILMA Compoundings – October 2019 - 42
ILMA Compoundings – October 2019 - 43
ILMA Compoundings – October 2019 - COUNSEL COMPOUND
ILMA Compoundings – October 2019 - 45
ILMA Compoundings – October 2019 - 46
ILMA Compoundings – October 2019 - 47
ILMA Compoundings – October 2019 - WASHINGTON LANDSCAPE
ILMA Compoundings – October 2019 - 49
ILMA Compoundings – October 2019 - Member Connections
ILMA Compoundings – October 2019 - 51
ILMA Compoundings – October 2019 - Cross Connections
ILMA Compoundings – October 2019 - 53
ILMA Compoundings – October 2019 - 54
ILMA Compoundings – October 2019 - 55
ILMA Compoundings – October 2019 - 56
ILMA Compoundings – October 2019 - 57
ILMA Compoundings – October 2019 - 58
ILMA Compoundings – October 2019 - 59
ILMA Compoundings – October 2019 - PORTRAIT
ILMA Compoundings – October 2019 - Cover3
ILMA Compoundings – October 2019 - Cover4
https://www.nxtbook.com/ygsreprints/ILMA/G127535ILMA_vol71_no7
https://www.nxtbook.com/ygsreprints/ILMA/G126213ILMA_vol71_no6
https://www.nxtbook.com/ygsreprints/ILMA/G125546_ILMA_vol71_no5
https://www.nxtbook.com/ygsreprints/ILMA/G124996_ILMA_vol71_no4
https://www.nxtbook.com/ygsreprints/ILMA/G123886_ILMA_vol71_no3
https://www.nxtbook.com/ygsreprints/ILMA/G123315_ILMA_vol71_no2
https://www.nxtbook.com/ygsreprints/ILMA/G122980_ILMA_vol71_no1
https://www.nxtbook.com/ygsreprints/ILMA/G121540_ILMA_vol70_no11
https://www.nxtbook.com/ygsreprints/ILMA/G120882_ILMA_vol70_no10
https://www.nxtbook.com/ygsreprints/ILMA/G120035_ILMA_vol70_no9
https://www.nxtbook.com/ygsreprints/ILMA/G121XXX_ILMA_vol70_no8
https://www.nxtbook.com/ygsreprints/ILMA/G120XXX_ILMA_vol70_no7
https://www.nxtbook.com/ygsreprints/ILMA/G119XXX_ILMA_vol70_no6
https://www.nxtbook.com/ygsreprints/ILMA/G118112_ILMA_vol70_no5
https://www.nxtbook.com/ygsreprints/ILMA/G117382_ILMA_vol70_no4
https://www.nxtbook.com/ygsreprints/ILMA/G116888_ILMA_vol70_no3
https://www.nxtbook.com/ygsreprints/ILMA/G115555_ILMA_vol70_no2
https://www.nxtbook.com/ygsreprints/ILMA/G114774_ILMA_vol70_no1
https://www.nxtbook.com/ygsreprints/ILMA/g110500_ILMA_vol69_no12
https://www.nxtbook.com/ygsreprints/ILMA/g110500_ILMA_vol69_no11
https://www.nxtbook.com/ygsreprints/ILMA/g110500_ILMA_vol69_no10
https://www.nxtbook.com/ygsreprints/ILMA/g109884_ILMA_vol69_no9
https://www.nxtbook.com/ygsreprints/ILMA/g109284_ILMA_vol69_no8
https://www.nxtbook.com/ygsreprints/ILMA/g108494_ILMA_vol69_no7
https://www.nxtbook.com/ygsreprints/ILMA/g107507_ILMA_vol69_no6
https://www.nxtbook.com/ygsreprints/ILMA/g106483_ILMA_vol69_no5
https://www.nxtbook.com/ygsreprints/ILMA/g105803_ILMA_vol69_no4
https://www.nxtbook.com/ygsreprints/ILMA/g104743_ILMA_vol69_no3
https://www.nxtbook.com/ygsreprints/ILMA/g103647_ILMA_vol69_no2
https://www.nxtbook.com/ygsreprints/ILMA/g102869_ILMA_vol69_no1
https://www.nxtbook.com/ygsreprints/ILMA/g101930_ILMA_vol68_no12
https://www.nxtbook.com/ygsreprints/ILMA/g100836_ILMA_vol68_no11
https://www.nxtbook.com/ygsreprints/ILMA/g99200_ILMA_vol68_no10
https://www.nxtbook.com/ygsreprints/ILMA/g98468_ILMA_vol68_no9
https://www.nxtbook.com/ygsreprints/ILMA/g97711_ILMA_vol68_no8
https://www.nxtbook.com/ygsreprints/ILMA/G96767ILMA_vol68_no7
https://www.nxtbook.com/ygsreprints/ILMA/G95397ILMA_vol65_no6
https://www.nxtbook.com/ygsreprints/ILMA/G94323ILMA_vol68_no5
https://www.nxtbook.com/ygsreprints/ILMA/G93127_ILMA_vol69_no4
https://www.nxtbook.com/ygsreprints/ILMA/G91785_ILMA_vol68_no3
https://www.nxtbook.com/ygsreprints/ILMA/G90956_ILMA_vol68_no2
https://www.nxtbook.com/ygsreprints/ILMA/G89146_ILMA_vol68_no1
https://www.nxtbook.com/ygsreprints/ILMA/G87981_ILMA_vol67_no12
https://www.nxtbook.com/ygsreprints/ILMA/G85409_ILMA_vol67_no11
https://www.nxtbook.com/ygsreprints/ILMA/G83595_ILMA_vol67_no10
https://www.nxtbook.com/ygsreprints/ILMA/G81672_ILMA_vol67_no9
https://www.nxtbook.com/ygsreprints/ILMA/G80238_ILMA_vol7_no8
https://www.nxtbook.com/ygsreprints/ILMA/G79388_ILMA_vol7_no7
https://www.nxtbook.com/ygsreprints/ILMA/G78361_ILMA_vol7_no6
https://www.nxtbook.com/ygsreprints/ILMA/G77448_ILMA_vol7_no5
https://www.nxtbook.com/ygsreprints/ILMA/G75899_ILMA_vol67_no4
https://www.nxtbook.com/ygsreprints/ILMA/G75036_ILMA_vol67_no3
https://www.nxtbook.com/ygsreprints/ILMA/G72720_ILMA_vol67_no2
https://www.nxtbook.com/ygsreprints/ILMA/G72220_ILMA_vol67_no1
https://www.nxtbook.com/ygsreprints/ILMA/G70970_ILMA_vol66_no12
https://www.nxtbook.com/ygsreprints/ILMA/G69813_ILMA_vol66_no11
https://www.nxtbook.com/ygsreprints/ILMA/G67522_ILMA_vol66_no10
https://www.nxtbook.com/ygsreprints/ILMA/G66343_ILMA_vol66_no9
https://www.nxtbook.com/ygsreprints/ILMA/G64859_ILMA_vol66_no8
https://www.nxtbookmedia.com