{"id":46309,"date":"2021-11-18T02:27:00","date_gmt":"2021-11-18T07:27:00","guid":{"rendered":"http:\/\/blog.cybercon1.com\/?p=46309"},"modified":"2021-11-18T02:27:00","modified_gmt":"2021-11-18T07:27:00","slug":"the-iot-is-getting-a-lot-bigger-but-security-is-still-getting-left-behin","status":"publish","type":"post","link":"https:\/\/blog.cyberconservices.com\/index.php\/2021\/11\/18\/the-iot-is-getting-a-lot-bigger-but-security-is-still-getting-left-behin\/","title":{"rendered":"The IoT is getting a lot bigger, but security is still getting left behin"},"content":{"rendered":"\n<p>By\u00a0<a href=\"https:\/\/www.zdnet.com\/meet-the-team\/uk\/dannypalmerzdnet\/\">Danny Palmer\u00a0<\/a>&#8211; Four out of five\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/www.zdnet.com\/article\/what-is-the-internet-of-things-everything-you-need-to-know-about-the-iot-right-now\/\" target=\"_blank\">Internet of Things (<strong>IoT<\/strong>) device manufacturers<\/a>\u00a0are failing basic cybersecurity practices by not providing a way for people to disclose security vulnerabilities in their products \u2013 something that can potentially put users of the device at risk of cyberattacks and breaches of privacy.<\/p>\n\n\n\n<p><a rel=\"noreferrer noopener\" href=\"https:\/\/www.iotsecurityfoundation.org\/consumer-iot-sector-basic-hygiene-practice-still-not-happening\/\" target=\"_blank\">Research by the IoT Security Foundation<\/a>\u00a0(IoTSF) \u2013 a tech industry group that aims to help encourage securing the\u00a0<a href=\"https:\/\/www.zdnet.com\/article\/what-is-the-internet-of-things-everything-you-need-to-know-about-the-iot-right-now\/\">Internet of Things<\/a>\u00a0\u2013 analysed hundreds of popular IoT product manufacturers and found that only just over one in five advertise a public channel for reporting security vulnerabilities in order for them to be fixed.<\/p>\n\n\n\n<p>The 21% of vendors offering this kind of channel has risen slightly since last year, something that the IoT Security Foundation report describes as &#8220;glacial&#8221; progress on providing what it describes as &#8220;a basic hygiene mechanism&#8221;.<\/p>\n\n\n\n<p>That&#8217;s despite countries around the world including\u00a0<a href=\"https:\/\/www.zdnet.com\/article\/internet-of-things-devices-stick-to-these-security-rules-or-you-could-face-a-ban\/\">the UK<\/a>,\u00a0<a href=\"https:\/\/www.zdnet.com\/article\/regulating-iot-where-trump-and-the-gop-should-start\/\">the US,<\/a>\u00a0Singapore, India and\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/www.zdnet.com\/article\/canberra-proposes-iot-star-ratings-and-mandatory-cyber-standards-for-big-business\/\" target=\"_blank\">Australia<\/a>\u00a0as well as\u00a0<a href=\"https:\/\/www.zdnet.com\/article\/securing-the-iot-a-question-of-checks-and-balances\/\">the European Union<\/a>\u00a0attempting to emphasise the importance of cybersecurity in IoT devices and the ability to be able to make vulnerability disclosures.  <a href=\"https:\/\/www.google.com\/url?rct=j&amp;sa=t&amp;url=https:\/\/www.zdnet.com\/article\/the-iot-is-getting-a-lot-bigger-but-security-is-still-getting-left-behind\/&amp;ct=ga&amp;cd=CAEYAyoUMTY0NTM5NjYzMTE1MjIxNDEwNjIyGmEyZDc1YTAxNDlhODIxZDc6Y29tOmVuOlVT&amp;usg=AFQjCNERvtTyBbCxKzaTqSQkZ-0QRAlOlA\">Read On:<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By\u00a0Danny Palmer\u00a0&#8211; Four out of five\u00a0Internet of Things (IoT) device manufacturers\u00a0are failing basic cybersecurity practices by not providing a way for people to disclose security vulnerabilities in their products \u2013 something that can potentially put users of the device at <span class=\"excerpt-dots\">&hellip;<\/span> <a class=\"more-link\" href=\"https:\/\/blog.cyberconservices.com\/index.php\/2021\/11\/18\/the-iot-is-getting-a-lot-bigger-but-security-is-still-getting-left-behin\/\"><span class=\"more-msg\">Continue reading &rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":46310,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[626,14],"tags":[627,150],"class_list":["post-46309","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-iot","category-security","tag-iot","tag-security"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/46309","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/comments?post=46309"}],"version-history":[{"count":0,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/46309\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media?parent=46309"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/categories?post=46309"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/tags?post=46309"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}