Beyond the Kingdom’s Gates: How the Internet of Things Expands Cyber Risk Well Beyond Your Perimeter

It’s an exciting Friday at the company. Months of planning an acquisition will culminate in a public announcement early the next week. In a bustling conference room, the planning team reviews the execution plan one last time. Spirits are high as the weekend approaches.

By midday Monday, the mood has drastically shifted. An early morning buying frenzy of the target company’s stock inflated its price, fueling rampant speculation of an acquisition. The stock is no longer at an acceptable price and months of planning are undone. The company’s executives, confident in the deal team’s integrity, engage a cybersecurity firm to determine if they’ve been hacked.

The cybersecurity team determined the smart TV in the conference room was hacked, its built-in microphone activated and recordings of planning sessions were exfiltrated. The company carefully secured email and other traditional IT resources but overlooked the Internet of Things (IoT).

What Is ‘The Internet of Things’?



Without a universally accepted definition, IoT is generally considered the interconnection of any device to other devices or systems through the Internet. While that may seem simplistic, IoT is that all-encompassing. Examples include everything from simple household appliances to city-wide flood control and emergency response systems. The purposes for IoT can be equally varied, from reporting malfunctions in machinery to actively collecting data in smart homes and taking complex actions based on that input. According to research firm Gartner, by 2020 the total number of IoT devices on the Internet is expected to exceed 20 billion.

While the scope is vast, there are generally three types of IoT technologies:

• Consumer: Examples include Alexa, Google Home, automobiles, monitoring solutions and wearables. Consumer IoT tends to access a wide array of data (including audio, video, biological, medical and environmental), with widely varied cybersecurity capability. Consumer IoT often has bidirectional functionality; the device not only monitors and reports but can take actions based on collected data.



• Enterprise/Commercial: Examples include office lighting systems, teleconferencing solutions, office monitoring solutions and medical equipment. Enterprise IoT tends to be moderately homogeneous with specific purpose and limited data. Enterprise systems tend have some limited bidirectional functionality.



• Industrial: Examples include fuel level monitoring, malfunction reporting, anomaly reporting and automation metrics. Industrial IoT tends to perform simpler functions with a single purpose and limited access to data. Industrial IoT is often, but not always, unidirectional reporting data back to the user but unable to take actions based on input.