{"id":32959,"date":"2019-11-01T03:27:00","date_gmt":"2019-11-01T07:27:00","guid":{"rendered":"http:\/\/blog.cybercon1.com\/?p=32959"},"modified":"2019-11-01T03:27:00","modified_gmt":"2019-11-01T07:27:00","slug":"unapproved-internet-of-things-devices-cause-headaches-on-sites","status":"publish","type":"post","link":"https:\/\/blog.cyberconservices.com\/index.php\/2019\/11\/01\/unapproved-internet-of-things-devices-cause-headaches-on-sites\/","title":{"rendered":"Unapproved &#8216;Internet of Things&#8217; Devices Cause Headaches on Sites"},"content":{"rendered":"\n<p>Tim Nottoli, Walsh Construction\u2019s chief information officer, has seen Google\u2019s Nest and Amazon\u2019s Ring cameras brought onto the company\u2019s construction sites and has dealt with every type of sensor used properly and improperly on the company\u2019s network. But recently, he uncovered a network vulnerability inside a construction trailer that wasn\u2019t connected to any computer system he\u2019d encountered before.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignleft size-medium\"><img decoding=\"async\" src=\"http:\/\/www.cyberconservices.com\/wp-content\/uploads\/2019\/10\/coffee-machine-146435__340-214x300.png\" alt=\"\" class=\"wp-image-32960\"\/><\/figure><\/div>\n\n\n\n<p>\u201cWe actually had somebody plug in a coffee maker that was broadcasting to the internet,\u201d Nottoli says. \u201cThe vendor they were buying it from wanted to be able to let it call home to tell them that they are running low on beans and supplies. I\u2019m not joking, it was a vendor with a coffee maker talking to the internet.\u201d The vendor set up the coffee maker to use Walsh\u2019s guest network to connect online, and hadn\u2019t thought to mention it to anyone in the IT department.<\/p>\n\n\n\n<p>The security of IoT devices and their uneven implementation is a major stumbling block to deploying IoT initiatives for contractors. While contractors are increasingly adopting IoT devices to improve productivity, efficiency and safety, they must balance all of those rollouts with the potential of adding vulnerabilities to their network. Policing unapproved devices added on construction sites, such as Walsh\u2019s coffee maker, takes up IT staff time and energy and keeps them from working on secure implementations.<\/p>\n\n\n\n<iframe style=\"width:120px;height:240px;\" align=\"right\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" frameborder=\"0\" src=\"\/\/ws-na.amazon-adsystem.com\/widgets\/q?ServiceVersion=20070822&#038;OneJS=1&#038;Operation=GetAdHtml&#038;MarketPlace=US&#038;source=ss&#038;ref=as_ss_li_til&#038;ad_type=product_link&#038;tracking_id=cyberconservi-20&#038;language=en_US&#038;marketplace=amazon&#038;region=US&#038;placement=B07WHV63P6&#038;asins=B07WHV63P6&#038;linkId=88207558169ce4956e5ec04778cfc9b7&#038;show_border=true&#038;link_opens_in_new_window=true\"><\/iframe>\n\n\n\n<p>\u201cWith humans you have to interact, you might have to explain something [like phishing],\u201d says Jayson Street, vice president of Information Security at SphereNY, a network security firm that finds vulnerabilities via \u201cwhite-hat hacking,\u201d done to improve security. \u201cA lot of these devices, though, they\u2019re armed by default, or there\u2019s no security baked into them at all or very easily crackable security.\u201d  <a href=\"https:\/\/www.google.com\/url?rct=j&amp;sa=t&amp;url=https:\/\/www.enr.com\/articles\/47987-unapproved-internet-of-things-devices-cause-headaches-on-sites&amp;ct=ga&amp;cd=CAEYCioTNTQ3MzMwMzM1OTg1MDcyOTExMTIaYTJkNzVhMDE0OWE4MjFkNzpjb206ZW46VVM&amp;usg=AFQjCNHxiNRBa33cHl6v-CpEZX1R8U58jA\">Read On:<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tim Nottoli, Walsh Construction\u2019s chief information officer, has seen Google\u2019s Nest and Amazon\u2019s Ring cameras brought onto the company\u2019s construction sites and has dealt with every type of sensor used properly and improperly on the company\u2019s network. But recently, he <span class=\"excerpt-dots\">&hellip;<\/span> <a class=\"more-link\" href=\"https:\/\/blog.cyberconservices.com\/index.php\/2019\/11\/01\/unapproved-internet-of-things-devices-cause-headaches-on-sites\/\"><span class=\"more-msg\">Continue reading &rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[649,626],"tags":[650,627],"class_list":["post-32959","post","type-post","status-publish","format-standard","hentry","category-internet-of-things","category-iot","tag-internet-of-things","tag-iot"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/32959","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/comments?post=32959"}],"version-history":[{"count":0,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/32959\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media?parent=32959"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/categories?post=32959"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/tags?post=32959"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}