Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

The Internet of Forgotten Things Will Leave a Dangerous Legacy

The Internet of Things (IoT) infrastructure will soon become unmanageable and impossible to secure effectively, with attackers discovering a growing number of abandoned, network-connected devices and subsequently compromising them. Over the coming years, organizations will find themselves unable to patch, update and operate a range of IoT devices that will be phased out of production by manufacturers who have gone out of business or have discontinued support.

Read Also: Core Scientific Acquires Atrio, Strengthening Its AI Capabilities As The Cloud For Data Scientists

These devices will be forgotten by organizations and abandoned by their manufacturers. They will be left vulnerable and remain embedded in places such as underground pipes, air conditioning ducts, and factory assembly lines, yet will continue to connect to networks.

Frequent overhauling of IoT estates will result in a combination of new IoT ecosystems coexisting with old and forgotten ones. Not only will these abandoned devices create an ingress point for attackers within a corporate network, they may also pose real hazards to related machinery and critical infrastructure.

The Internet of Forgotten Things (IoFT) will leave a dangerous legacy of connected devices that are unpatched, unprotected and vulnerable to a range of attacks, which will come back to bite organizations.

Nation-states organized criminal groups and hackers will take advantage of these devices. They will exploit homogeneous vulnerabilities and use forgotten IoT devices as an entry point into many organizations, causing financial and operational damage.

What is the Justification for This Threat?

Organizations’ desire for data and analytics, fueled by high-speed connectivity, will drive the IoT to grow at a frightening speed.

With the growing development of 5G networks, estimates have found that there will be 75 billion IoT devices installed worldwide by 2025, as devices spread further into offices, homes, and factories.

A study conducted by the same organization in 2018 found that 90% of senior executives in technology, media, and telecommunications industries said that IoT devices are critical to some or all lines of their business. Ericsson also estimates that over 22 billion IoT devices will require a critical end-to-end security framework over the coming years, but currently, the IoT devices lack the required security.

With incredibly short production times, heightened consumer demand for new products, and high turnover rates of IoT devices, the ability of manufacturers to continue supporting a range of IoT devices will reduce.

Related Posts
1 of 1,222

A recent report stated that there is an alarming number of unsecured or obsolete consumer and industrial IoT devices no longer supported by their manufacturers, however, are still being used. This number is expected to grow as device manufacturers phase out support for devices or go out of business.

When IoT manufacturers or retailers go out of business, valuable data will be lost – including confidential or personal information.

With vulnerabilities being shared among devices and a lack of devices being updated and patched, it is plausible that an epidemic similar to the Mirai virus – where attackers turned exploitable IoT devices into botnets – may soon impact devices that are currently embedded within organizations but have lost manufacturer support.

As IoT estates grow and organizations become more dependent upon their efficacy to operate, the number of opportunities attackers will have to exploit organizations will amplify.

Many Western governments and regulators, such as those in the US, Germany and the UK are beginning to introduce security guidelines for IoT manufacturers. However, the lack of uniformity between these international guidelines will continue to be a problem for organizations. In addition, chip manufacturers across South East Asia and China, with vastly different or non-existent IoT regulations, continue to be critical component manufacturers for IoT devices made and used across the US and Europe.

The widespread proliferation of the IoT across a growing number of industry and consumer markets means that, if inappropriately managed, it will fast become a major security concern and risk to organizations.

IoT hardware researchers are currently struggling to protect IoT devices, as they are built into a range of proprietary operating systems with differing communication protocols. This makes it incredibly difficult to develop monitoring and defensive countermeasures that run across an entire estate of devices. A report from Gemalto showed that 48% of surveyed organizations are unable to detect breaches of IoT devices. The IoFT will exacerbate this already alarming risk.

With the number of IoT devices growing both in the workplace and homes, combined with an unmanageable supply chain, the threat of forgotten, unpatched and unsupported devices coming back to bite organizations cannot be ignored.

How Should Your Organization Prepare?

Extreme weather events, coupled with environmental activism, should prompt a fundamental re-examination of and re-investment in organizational resilience. It is critical that organizations risk assess their physical infrastructure and decide whether to relocate, harden it or transfer risk to cloud service providers.

In the short term, organizations should conduct a discovery exercise to create an IoT asset inventory and run an active decommissioning or reactivation program for discovered IoT devices.

In the long term, create micro-segmentation architecture for IoT devices. Additionally, incorporate IoT into the IT sourcing strategy, ensuring that rigorous procurement procedures are included. Finally, insure that IoT devices do not create operational dependencies.


  2. […] Recommended AI News: The Internet Of Forgotten Things Will Leave A Dangerous Legacy […]

  3. […] Recommended AI News: The Internet Of Forgotten Things Will Leave A Dangerous Legacy […]

  4. […] solution that goes beyond the traditional operation. It brings together AI, Machine Learning, IoT Networking, IT and Cloud applications laced with cutting edge add-on technologies such as Big data Analytics, […]

  5. I’m cheerful I found this blog! Every now and then, understudies need to psychologically the keys of beneficial artistic articles forming. Your information about this great post can turn into a reason for such individuals.
    360DigiTMG iot certification courses

  6. princika sweety says

    I want to leave a little comment to support and wish you the best of luck.we wish you the best of luck in all your blogging enedevors.

  7. iot certification courses says

    The writer is amped up for purchasing wooden furniture on the web and his examination about best wooden furniture has accomplished the blueprint of this article.
    iot certification courses

  8. iot course says

    I need to communicate my deference of your composing aptitude and capacity to make perusers read from the earliest starting point as far as possible. I might want to peruse more up to date presents and on share my musings with you.
    IoT Course

  9. iot training in malaysia says

    I have bookmarked your site since this site contains significant data in it. You rock for keeping incredible stuff. I am a lot of appreciative of this site.
    IoT Training in Malaysia

  10. Charleshag says

    kim il kwang art book Rim’k Seul Gratuitement amliyat roohani book pdf

  11. Hyper Casino Pate A Tartiner says

    Watch Jackpot Full Movie On Dailymotion Vik Arena Blanca Casino Petit Casino Marcadieu Tarbes

  12. iot training in malaysia says

    I need to communicate my deference of your composing aptitude and capacity to make perusers read from the earliest starting point as far as possible. I might want to peruse more up to date presents and on share my musings with you.
    IoT Training in Malaysia

  13. Num Ro Client Casino Salle De Reception Casino Boulogne Sur Mer Casino Barriere A Ouistrham

Leave A Reply

Your email address will not be published.