Business News Daily provides resources, advice and product reviews to drive business growth. Our mission is to equip business owners with the knowledge and confidence to make informed decisions. As part of that, we recommend products and services for their success.
We collaborate with business-to-business vendors, connecting them with potential buyers. In some cases, we earn commissions when sales are made through our referrals. These financial relationships support our content but do not dictate our recommendations. Our editorial team independently evaluates products based on thousands of hours of research. We are committed to providing trustworthy advice for businesses. Learn more about our full process and see who our partners are here.
The IoT is a helpful network of connected devices that businesses rely on today more than ever. However, this technology comes with some serious risks.
Smart gadgets are everywhere, and businesses are increasingly using them to streamline their operations. Oil companies can now maximize production and efficiency at individual wells using networked sensors that make automatic microadjustments to pump stroke rates. Food retailers and restaurants fit their trash containers with connected weight sensors designed to reduce the financial, social and environmental impact of the waste they produce. These devices represent the Internet of Things (IoT) and it’s bigger than connecting our laptops, desktops and mobile phones.
The ability of these devices to send and receive data and to talk to each other will make running our lives and companies easier in many ways we can’t quite conceive of yet. However, this interconnectedness also exposes businesses to vulnerabilities they might not have considered before. From data breaches to system failures, the IoT brings a world of potential risks for your business.
The IoT refers to the network of interconnected devices, sensors and objects that collect data and exchange it over the internet. They often don’t require any human intervention to function and “talk” with one another. These devices include everyday items, such as smartwatches, security equipment, cars, electronic appliances, lights in commercial environments, video surveillance systems, speaker systems and vending machines.
Specialized equipment in industries, such as healthcare, agriculture and manufacturing, are also integral to the IoT system. Oil companies, for example, often use spill-detecting sensors and monitors. Physical therapists use mobility tracking devices to monitor their patients’ movements and manufacturers put robots on their assembly lines to automate production processes.
This era of connected devices creates significant business opportunities and changes the way people work as the IoT network grows in size and capabilities. However, the IoT also presents a major threat to businesses in the form of cyberattacks. Below are some key benefits and disadvantages to consider before integrating IoT devices into your business. [Related article: Small Business Guide to Cybersecurity]
One reason some consider the IoT bad for business is because of their vulnerability to cyberattacks. IoT devices are of interest to cyberattackers for four main reasons:
It should be noted most Wi-Fi connections are not secure either and Bluetooth, despite being a mature technology, has 16 different security vulnerabilities. RFID, used in logistics and retail, has many of its own issues too. Meanwhile, low-power wide-area networks almost exclusively used by businesses, transmit data from IoT devices like sensors back to the base using wireless, low-bitrate, long-range communications. However, they’re also vulnerable because they use a simpler encryption method to save power.
IoT devices connect to domestic and corporate computer systems. Heating systems, smart fridges, smart thermostats and other devices often connect to the same corporate networks as customer databases and point-of-sale systems.
But why would a cybercriminal attack a connected fridge? It’s not because they want to control your refrigerator. They want access to your corporate network and your fridge will often be less protected than, say, your Wi-Fi router. Once they have access to your corporate network via that smart fridge, they’ll try to take control of it.
When they’ve gained control, they can — for example — install ransomware to blackmail your company or run cryptocurrency-mining malware, which requires so much computing resource that it renders your network unusable. They may grant themselves user privileges to access sensitive client information, launch denial-of-service attacks against your website or interject themselves into email conversations between your company and clients.
In 2021, software security company McAfee discovered a security flaw in an IoT exercise bike manufactured by market leader Peloton. This flaw could have allowed a hacker to steal information from Peloton’s customer database, including users’ birthdays, genders, workout stats, weights and ages, all because of a faulty application programming interface. In another real-life example, in 2020 users of a popular range of smart chastity belts lost their ability to operate them due to a hacker and found themselves subject to a $235 demand to regain control.
The lesson? Cyberattackers can gain access to any connected device and exploit it in several ways.
Using IoT devices in your business introduces not only security risks but also financial ones.
The financial and reputational costs of a cyberattack are significant even for large corporations, but for small businesses, a cyberattack could mean closing up shop.
“Overall, there’s going to be tremendous benefits to the IoT — it’s exciting,” said Kevin Haley, the former director of security, technology and response at Symantec. “We’re going to see all these different applications but, as a security professional, I’m seeing that there’s a headlong rush into this stuff without anybody really thinking through the consequences or the security aspects of it.”
A hacker could even access a small business’s network by hacking into its security system. “Now, anybody who has an internet connection and some hacking skills can also view your most important stuff,” Haley said.
The costs of mitigating the damage from such a breach could be catastrophic for a small business.
Roel Schouwenberg, senior security researcher at Kaspersky Lab, agreed with Haley’s assessment.
“All these new smart devices come with their own specific, new vulnerabilities, which can give attackers new opportunities. They may require new technology and approaches to protect [them] properly,” said Schouwenberg. “But people in small businesses will generally have their hands full covering their existing technology. Adding new, complex devices to the equation is going to make things a lot more difficult.”
When it comes to the IoT, small and midsize businesses have to worry that hackers could access their networks through their connected devices.
“Any way into — or any device into — the corporate network is one that needs protection,” Schouwenberg said. “Attacks have become more targeted, even against smaller companies, so all these scenarios require attention.”
While cyberattacks involving large corporations tend to be the ones that garner headlines, small businesses may be at even more risk when using IoT devices for the following reasons.
Small businesses are particularly vulnerable to security risks because they don’t usually have their own dedicated security staff. If they’re lucky, the people they pay to do their computer work happen to understand it and look out for them, said Chester Wisniewski, director of Global Field chief technology officer at security company Sophos.
Most of them don’t provide that protection, though, leaving small businesses wide open to attacks.
The more IoT devices your business uses, the more at risk you are — especially if security protections weren’t built into the system’s design.
“To a large degree, the best thing to do is not use all these connected devices or at least to understand what the risk factor might be,” Wisniewski said. “I’ve seen people who have plants that tweet when they need to be watered. We’re hooking everything to the internet. The safest approach is to do what I do and just don’t plug this stuff in.”
Part of the security risk stems from these devices’ industrial control systems, which are often designed by people who do one thing very well. For instance, a system might be designed by a person who knows a lot about refrigerators or thermostats who programmed the software, so the appliance or device does all kinds of cool things, Wisniewski said.
“The question is, did they have a security expert involved in these things to understand what they need to do to maintain security? What happens when it’s time to patch your refrigerator? How do you know you need to fix your refrigerator?”
Said Schouwenberg, “[IoT devices] should all be designed with security in mind. Given the slow life cycle on most of these devices, that’s going to be very important. What I hope to see is that for the makers of smart devices, security will become a competitive advantage.”
If you put your refrigerator or your smart thermostat on a Wi-Fi network that’s also used for your business software, you’re more vulnerable because computer code always has flaws that cybercriminals can exploit, Wisniewski said. For small businesses, these smart appliances or devices are usually on the same network that contains customer and credit card information.
“It’s a way for someone to have a foothold inside your network that you can’t track down because you never think that it’s that thing [like your refrigerator] that’s stealing data from your network,” Wisniewski said. “The more things connected to the area where you’re conducting business, the worse it is.”
Any piece of hardware that can interface with something electronically is at risk of exploitation, added Schouwenberg.
There are multiple ways to protect your IoT devices, your network and the data stored on your network.
Schouwenberg said it’s nearly impossible for a small business to protect all of its assets, so he suggested listing your biggest assets and then putting the most effort into preventing the network security threats involved with those assets.
“Work your way down from there,” he said. “Segregate your network. IoT and BYOD (bring your own device) can go hand in hand, so you may also want to look at policies in that area. Many new smart devices, like fridges or TVs, have functioned perfectly fine as dumb devices. Unless you have a very valid business case, it’s best to not hook them up.”
Small businesses should also limit the sensitive information they collect, said Jay Radcliffe, director of product security testing at Thermo Fisher Scientific.
“If you’re not doing anything with names and addresses and your system by default is collecting that information, then don’t collect it,” he said. “The tendency for vendors and people supplying the IoT is to have all that stuff turned on. It’s like going to a restaurant and ordering every dish they have when really all you need is one thing.”
Wisniewski said that one way for small businesses to protect themselves is to not use Wi-Fi.
“Know what’s plugged into your network,” he said. “Don’t allow your employees to bring their laptops in and plug them into your network that you’re processing credit cards on.”
If you want a Wi-Fi network for employees to use during their breaks, run a separate network with just the Wi-Fi, Wisniewski said. “Give them a free Wi-Fi [network], but make sure that free Wi-Fi isn’t hooked into the same place where you’re doing all the critical stuff.”
If a physical connection to an IoT device is not possible and you need to rely on Wi-Fi, consider switching to a new network that uses the WPA3 protocol and not the now-compromised WPA2. All Wi-Fi devices manufactured since July 1, 2020, must have WPA3 certification, but check with your vendor before purchasing.
Cybersecurity while traveling is another concern. Use 3G, 4G or 5G when possible, because a favorite trick for cybercriminals to use in open places and hotel lobbies is creating alternative, authentic-looking Wi-Fi networks that fool unsuspecting users.
Check every product you want to connect to your network before you purchase it because even a printer can pose a security risk.
Haley said part of the onus for security should be on the manufacturers of these connected devices.
“I think manufacturers are going to have to figure this out but, unfortunately, it’s going to have to take a big incident [for things to change]. But for now, small businesses have to do a couple of things,” he said. “You have to ask what you have connected to the internet and what the risk of that is. … [I]f you have those security cameras, research and see if there are vulnerabilities — and if there are, patch them. If you have a commercial router, you have to make sure there are good passwords on there. If there’s a vulnerability, you have to make sure you’ve updated to the latest patches.”
Human error is the No. 1 cause of successful cybersecurity attacks within any business. From creating strong passwords to downloading patches on the day of release, every business needs to take cybersecurity seriously. Teach your staff about the types of attacks, how to spot them and what to do if they think they’ve been targeted.
Clear leadership from the top, as well as staff education and monitoring, is vital to cybersecurity at any company.
It isn’t necessarily a bad idea to embrace IoT technology as a small business owner. These devices can transform your business significantly and its operations for the better. However, it’s crucial to remain vigilant about the potential risks and challenges associated with installing and using IoT devices. This means prioritizing cybersecurity and data privacy protocols to safeguard your company and maximize the benefits of IoT technology.
Shayna Waltower and Linda Rosencrance contributed to this article. Source interviews were conducted for a previous version of this article.