Security industry 'has failed' to raise awareness of IoT safety

Symantec urges security pros to work with IoT manufacturers

The cyber security industry has "fundamentally failed" to educate consumers about the risks of IoT hacking, and is not doing enough to ensure devices built with security in mind.

That's according to Darren Thomson, EMEA CTO and VP of technology at Symantec, who believes that the industry's approach to IoT security is outdated, reflective of an bygone era when it was deemed enough to simply respond to threats.

"In the next decade we will see a whole new level of threat, that means we are going to really need to raise our game," said Thomson, speaking at London's Infosecurity Europe event today.

"For the last 30 or 40 years, we have been fundamentally designing insecure systems," explained Thomson, a process that meant companies like Symantec could come along and patch those holes when required. "When were talking about cities or rail networks, that benefit of the retrofit no longer exists."

The IoT has increasingly been seen as a 'wild west', a series of networks that is proving to be incredibly susceptible to remote hacking. As connected technology has become more popular, security has become an afterthought for many manufacturers, either too difficult or too expensive to build in, according to Thomson.

Security as a result often falls back on the customer, where they are expected to carry out technical tasks beyond their capabilities.

"If [we] think sending non-technical people to websites to tick security boxes is enough, we're kidding ourselves," said Thomson. "This industry has failed its users in regards to education and awareness. As an industry we're not meeting enough with manufacturers... everyone in the room is a tech person."

This issue will be solved when the security industry makes an effort to become more "predictive", according to Thomson. An example of this would be the formation of an "ingredients list" for the IoT, giving users exact information as to what to expect from a newly acquired smart home. This list, much like the dietary requirements on a food packet, would be a reference point for spotting unusual activity.

"Its about time that everyone in this industry starts to think about the unintended consequences. We have tried and failed to make people security experts. It doesn't work."

Featured Resources

Edge-enabled mobility of the future

Turning vehicle data into value

Download now

Modern networking for the borderless enterprise

Five ways top organisations are optimising networking at the edge

Download now

Address multi-cloud configuration risks

Cloud security challenges and how to overcome them

Watch now

The total economic impact of IBM Security Verify

Cost savings and business benefits enabled by IBM Security Verify

Download now

Recommended

How to enable private browsing on any device
privacy

How to enable private browsing on any device

8 Mar 2021
IT security awareness and training firm KnowBe4 acquires MediaPRO
Acquisition

IT security awareness and training firm KnowBe4 acquires MediaPRO

3 Mar 2021
High-risk email security threats increased by 32% last year
phishing

High-risk email security threats increased by 32% last year

3 Mar 2021
The top 12 password-cracking techniques used by hackers
Security

The top 12 password-cracking techniques used by hackers

3 Mar 2021

Most Popular

UK gov flip-flops on remote work, wants it a standard for all jobs
flexible working

UK gov flip-flops on remote work, wants it a standard for all jobs

5 Mar 2021
Star Alliance passenger data stolen in SITA data breach
data breaches

Star Alliance passenger data stolen in SITA data breach

5 Mar 2021
How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

26 Feb 2021