HP: 70% of Internet of Things devices vulnerable to attack
Research by HP suggests password security and encryption issues could leave Internet of Things devices vulnerable to attacks.
Seventy per cent of Internet of Things (IoT) devices are vulnerable to security risks, new research from hardware giant HP claims.
HP tested ten devices to see how open they are to security risks and concluded that eight out of ten of the devices would potentially allow hackers to access data, such as the owner's name, email address, home address, date of birth, credit card credentials and health information.
An even higher number (90 per cent) revealed information about the device itself or the cloud or mobile application it was running.
Even devices with a password activated weren't able to stop HP accessing the data. The report said 80 per cent of the devices were easy to guess with many of the IoT devices allowing passwords of no complexity to be set up, such as 1234.
Encryption was another concern. Seventy per cent of the devices tested didn't encrypt information sent over the local network or wider internet, while 60 per cent lacked app encryption for software updates.
HP concluded the reason such devices are left open to security risks is because the demand is so high that manufacturers rush them out to the shelf, without considering the consequences.
Gartner predicts 26 billion IoT devices will be in circulation by 2020. However, HP says manufacturers must consider the security risks associated with distributing them too quickly and whether this will have negative effects for consumers.
Mike Armistead, vice president and general manager of Fortify Enterprise Security Products at HP, said: "With the continued adoption of connected devices, it is more important than ever to build security into these products from the beginning to disrupt the adversary and avoid exposing consumers to serious threats."
The challenge of securing the remote working employee
The IT Pro Guide to Sase and successful digital transformationFree Download
VMware Cloud workload migration tools
Cloud migration types, phases, and strategiesFree download
Practices for maximising the business value of digital infrastructure Consumption-as- a-Service subscriptions
IDC PeerScapeFree Download
Container network security guide for dummies
Enforcing Kubernetes best practicesFree download