BETA
This is a BETA experience. You may opt-out by clicking here

More From Forbes

Edit Story

Top 10 Devices You Need To Secure In 2020

Forbes Technology Council
POST WRITTEN BY
Simon Biddiscombe

Getty

Although the holiday gift-giving season is long gone, many of us are still exploring the tech gadgets we received as gifts from friends and family. It’s pretty easy to get caught up in all the exciting new bells and whistles these devices bring to our lives, but there’s also a downside to these new ways of connecting.

Cybercriminals are working 24/7 to exploit any vulnerability they can find, and new connected/IoT devices are a major target. So as we return to the digital workplace with new gadgets in hand, we need to understand how hackers can exploit IoT security vulnerabilities to gain access to our enterprise data.

Below are some of the top threats facing your company if employee-owned devices are not properly managed through a secure BYOD program:

1. Laptop

Although this article mostly pertains to cybercrime, let’s not forget about good old-fashioned hardware theft — and laptops remain a popular target. Not only does this result in the financial loss of the device itself, but also the loss of personal apps and data such as work files and login data to all kinds of apps, websites and cloud services. The ability to lock down a device to prevent unauthorized access is critical to minimizing the risk to your personal and work data.

2. Smartphone

Cybercriminals are increasingly trying to “port” your telephone number to another carrier, an exploit that allows them to steal your identity, messages and call information from your phone. Although this threat is not new, it’s on the rise across all major carriers. Users can prevent this kind of attack by following their carrier’s recommended security protocol, such as maintaining a secure account PIN.

3. Smartwatch

Cybercriminals can use smartwatches to gain access to your sensitive business and personal data. For instance, a potential hacker could install a spying app on your smartwatch through phishing or public Wi-Fi exploits and then track your movements through the device’s accelerometer data. If you regularly connect to your company’s network, you could put your entire business at risk if a cybercriminal gains access to your smartwatch.

4. E-Reader

We don’t usually think these devices are that attractive to hackers. However, e-readers can run apps, which can be infected with malware downloaded from public app stores. Once the app is installed, malware transfers to the device to give hackers access to personal information, including passwords and other sensitive information.

5. Smart pen

Yes, even your smart pen is at risk! Doctors sometimes use smart pens to prescribe medications for patients. That personal information is then transmitted to pharmacies. In some instances, a hacker could leverage network protocols to gain access to the device. After exploiting the smart pen software to bypass the device's security checks, the hacker can gain administrative access to the organization’s back-end servers that store patient medical records and other sensitive data.

6. Smart speaker

While these “always listening” devices are fun and convenient, your privacy — and that of guests who visit your home or office — could be at risk. Some vulnerabilities may allow hackers to eavesdrop and record conversations or even phish unsuspecting users. By inadvertently uploading a malicious piece of software disguised as a new skill or action, a user may allow the exploit to silently record users or even ask them for the password to their online account. It’s important to note that device manufacturers are working continuously to mitigate these threats, so keeping up with the latest security patches is essential.

7. Augmented reality (AR) headset

Unfortunately, many IoT devices, such as virtual and augmented reality devices, have been designed and developed without including essential security protocols. For now, one of the best ways to protect your privacy is to stay on top of firmware and software updates from device manufacturers to ensure your immersive experience stays private and secure.

8. Wireless headphones

These Bluetooth-enabled devices, while convenient, are also prone to dangerous interference from cybercriminals. For instance, one critical vulnerability enables an attacking device to interfere with the connection encryption process. This allows the hacker to essentially steal the encryption key and access the data traffic between target devices.

9. Bluetooth trackers

These trackers attach to your wallet, keys, bag or other valuables to help you find them more easily. And that means hackers can also find them more easily. Because these tracking devices transmit location data wirelessly to your app, hackers can intercept that data and follow your movements more closely.

10. Video doorbell

Video doorbells have made headlines for a series of high-profile security breaches, and for good reason. Although many of these attacks were terrifying, they were also preventable. Modern IoT devices like video doorbells should start requiring a modern and secure authentication approach that goes beyond passwords. In the near term, be sure to enable two-factor authentication to minimize password breaches.

With more entry points for hackers to exploit on our personal devices, putting secure protection mechanisms in place should be a top priority for any company. At the same time, companies of all sizes should partner with mobile security leaders who have the in-depth experience and strategic vision to confidently lead the way through the new and constantly changing jungle of IoT threats.

Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives. Do I qualify?