HP: 70% of Internet of Things devices vulnerable to attack

Research by HP suggests password security and encryption issues could leave Internet of Things devices vulnerable to attacks.

The internet of things

Seventy per cent of Internet of Things (IoT) devices are vulnerable to security risks, new research from hardware giant HP claims.

HP tested ten devices to see how open they are to security risks and concluded that eight out of ten of the devices would potentially allow hackers to access data, such as the owner's name, email address, home address, date of birth, credit card credentials and health information.

An even higher number (90 per cent) revealed information about the device itself or the cloud or mobile application it was running.

Even devices with a password activated weren't able to stop HP accessing the data. The report said 80 per cent of the devices were easy to guess with many of the IoT devices allowing passwords of no complexity to be set up, such as 1234.

Encryption was another concern. Seventy per cent of the devices tested didn't encrypt information sent over the local network or wider internet, while 60 per cent lacked app encryption for software updates.

HP concluded the reason such devices are left open to security risks is because the demand is so high that manufacturers rush them out to the shelf, without considering the consequences.

Gartner predicts 26 billion IoT devices will be in circulation by 2020. However, HP says manufacturers must consider the security risks associated with distributing them too quickly and whether this will have negative effects for consumers.

Mike Armistead, vice president and general manager of Fortify Enterprise Security Products at HP, said: "With the continued adoption of connected devices, it is more important than ever to build security into these products from the beginning to disrupt the adversary and avoid exposing consumers to serious threats."

Featured Resources

The challenge of securing the remote working employee

The IT Pro Guide to Sase and successful digital transformation

Free Download

VMware Cloud workload migration tools

Cloud migration types, phases, and strategies

Free download

Practices for maximising the business value of digital infrastructure Consumption-as- a-Service subscriptions

IDC PeerScape

Free Download

Container network security guide for dummies

Enforcing Kubernetes best practices

Free download

Recommended

HP OfficeJet Pro 9012e review: Jack of all trades
peripherals

HP OfficeJet Pro 9012e review: Jack of all trades

6 Jan 2022
HP Envy 13 (13-ba1013na) review: Not a luxury laptop, but a long-lasting one
Laptops

HP Envy 13 (13-ba1013na) review: Not a luxury laptop, but a long-lasting one

25 Nov 2021
HP reveals Microsoft licensing management service for SMBs
Cloud

HP reveals Microsoft licensing management service for SMBs

17 Nov 2021
HP unveils new remote collaboration subscription offers
flexible working

HP unveils new remote collaboration subscription offers

10 Nov 2021

Most Popular

How to move Microsoft's Windows 11 from a hard drive to an SSD
Microsoft Windows

How to move Microsoft's Windows 11 from a hard drive to an SSD

4 Jan 2022
Microsoft Exchange servers break thanks to 'Y2K22' bug
email delivery

Microsoft Exchange servers break thanks to 'Y2K22' bug

4 Jan 2022
Solving cyber security's diversity problem
Careers & training

Solving cyber security's diversity problem

5 Jan 2022