You may have seen the term “internet of things” showing up in various blogs or news articles and maybe, like many of us, you’re unsure what the term means.
An article from Wired offers a helpful description – “In the broadest sense, the term IoT (or, Internet of Things) encompasses everything connected to the internet, but it is increasingly being used to define objects that ‘talk’ to each other.” So, when you hear about devices with the word “smart” in front of it, it means that these devices are connected via WiFi and cloud technologies that allow for new degrees of intuitiveness, capability, and convenience for users (e.g. smart cars, smart refrigerators, smart homes, smart luggage, etc.).
Increased connectivity is intended to make our lives easier, and in many ways it certainly does. However, for these devices to function the way they are intended, users must create accounts filled out with sensitive information. As connectivity spreads, it creates more entry points for thieves. Not only is our information more vulnerable, but the ability of malevolent actors to surveil our daily lives is also a concern for IoT.
Lawmakers and experts will have to figure out how to effectively regulate the lines between connectivity, protection, and data rights. In the meantime, before these laws and policies are in place, points of vulnerability are many and potentially unknown.
Our firm’s attention to cyberthreats toward individuals and small businesses is informed by the reality of these trends. Password management, two-factor authentication, virtual private networks (VPNs), and WiFi security all play a role in helping to secure your information. Increased connectivity means increased attention and awareness, and a greater need to understand where your points of vulnerability are located.