When the Internet of Things era comes, we must first pay attention to security issues.

There is a theory that anything in real life can be connected via the Internet, and people get real-world information through smartphones, tablets and computers - the known Internet world is like this. This theory has the potential to improve the lives of consumers in many ways. However, because the inherent technical risks in this theory are not explained, it is likely to cause economic losses.

The smart refrigerator can remind you when food expires. Smart meters are installed between the household and the energy company to communicate the user's usage information. The thermostat detector is connected to the building's air conditioning system to maintain a constant temperature. . This is just the tip of the iceberg. Also included are connected security systems, cars, appliances, energy-saving lights, intercom systems, vending machines. The data shows that IDC1 market research predicts that by the end of 2020, the total number of Internet of Things (IoT)-based connected devices will reach approximately $212 billion.

Google is optimistic about the potential of the Internet of Things, recently spent $ 3.2 billion to acquire Nest. Nest is an automated connection device provider that can set intelligent thermostats and smoke alarms via Wi-Fi.

Smart devices interact with the other end through Internet technologies such as Wi-Fi, ZigBee (wireless transport protocol), and computers connected to the cloud through corporate networks. Today's Internet of Things, heating systems, smart refrigerators, smart thermostats, and other smart devices are connected through a public network and interface with consumer databases, other systems such as point-to-point consumer (POS). There are also security risks.

Internet of Things risk

For example, in December last year, Target Data Corp. had a huge data invasion. One of the suppliers of the Ventilation and Temperature Control System (HVAC) of Target's department was invaded and connected to the retail network through long-distance access, causing a chain reaction in other systems of the Target Service, such as payment systems and credit card consumption systems ( POS system). This time, the intrusion has stolen 70 million consumer credit card information and debt information related to the card that was consumed in Target. Fortunately, large retailers can survive the attack.

However, if SMEs encounter such a thing, it is very likely that they have to close their doors.

"Overall, the Internet of Things has brought huge business opportunities---this is very exciting." Kevin Heller said - the head of the Xinbiya security sensing system. We have seen a wide variety of products on the market, but in terms of professional security, I have not found a unique product.

Heller said: "There are many products related to the Internet of Things that need to be controlled through open systems. This means that access to products is required. Because of the open system, it has become a weakness of the product. This gives Those destroyers have an opportunity to take advantage of them."

The irony is that a hacker even hacked into the network of SMEs through the company's security system. "Today, everyone who knows about Internet connection technology and has a bit of hacking technology is eyeing your best-selling product," Heller said.

Kaspersky’s Chief Security Institute, Roel Schouwenberg also agreed.

He said: "Every new smart device has its own particularities and weaknesses, which also provides opportunities for those attackers. They may need new technologies and methods to properly protect these devices. But developers of small and medium-sized companies usually Putting all of their energy into their product technology. New, more complex devices are increasing, and finding the balance between technology and security is becoming more and more difficult."

Schouwenberg went on to say: "When the Internet of Things era comes, many SMEs are worried that hackers invade their networks through their products. Multiple ways of access - multiple device access - any gateway to the company network needs Defense," he added. "There are more and more targets for attacks, and even micro-enterprises will be attacked, so this requires all-round attention."

Chester Wisniewski, senior international security consultant at Sophos, said: "Because small businesses generally don't have their own security staff, if they are lucky, they buy computers with their own defense software."

The problem is that many small businesses don't provide product security, and once they get out of the small business network, they can't resist the attack.

Wisniewski said, "Comparatively speaking, the most important thing for companies of larger scale is not to connect all their devices, but to at least know the existence of risk factors. In my opinion, if humans are compared to plants, the Internet is water. Plants are inseparable from water. Our lives are intertwined with the Internet. We should find the safest precautions, but only block the security holes.

The main focus of these products is industrial control systems, and the reason is because of the products that are usually made to make people easier to use. For example, refrigerators or air conditioners are manufactured because people need their cooling function. However, the software development is only developed around refrigeration. "

Wisniewski went on to say: "The question is, do you need security experts to participate in the entire product manufacturing, know where to take security precautions? Under what circumstances should the refrigerator be patched (patches vulnerabilities)? How do you know if your refrigerator needs repair? If you Connect your refrigerator or smart thermostat to Wi-Fi, and your problems are more exposed due to flaws in the computer code itself. For small businesses, smart appliances and devices are often connected to the public network, including consumption. And credit card information."

Wisniewski also said: "All equipment or appliances must be connected to the network. You can't leave behind the clues, so when you are not aware of it (like your refrigerator), the data has been stolen through the network. You are connected The more equipment or appliances you have, the more information you expose. This is a very bad thing."

Kaspersky's Schouwenberg said: "Any hardware device has the risk of information utilization through software interoperability. All products may be safe for themselves. It is very important that many smart devices make the whole life no longer in a hurry. What is the intelligent product that I am happy to see? Safety will become an important competitive force."

How to protect your information

Schouwenberg said: "Protecting all information security is almost impossible for SMEs, so he suggests listing a list of important information and working on the protection of the items on the list. The source of the problem is in the user, separation Public networks and the Internet of Things, the Internet of Things is only connected to its own devices, so you may feel that there are police guarding the land. Many new smart devices, such as refrigerators and TVs, are fully functional, but unless they are System security is trustworthy, otherwise it is best not to be on the business."

Wisniewski agrees that small businesses are not allowed to use Wi-Fi in order to protect themselves. He said: "In order to know who is connected to the company network. Do not allow their employees to bring their mobile computers to the company's network. The reason is that the company's network process has user credit card information. Or, if you want your employees Wi-Fi can be used, but in order to prevent its damage, the only way to do this is to separate the network. Free Wi-Fi is provided to employees, but it is certain that free Wi-Fi will not become a dangerous vulnerability."

Helen of Symantec believes that manufacturers of connected devices need to take responsibility for security.

He said: "I think manufacturers should stand up and take this responsibility. But unfortunately, this may require a big security incident to change the current situation. In fact, small businesses now have to deal with it from two sides. Information security. On the one hand, you have the hope that the device will connect to the network, and on the other hand, there is a hidden danger of information leakage. This also requires the user to take responsibility for it. Use security snapshots to find security risks, identify hidden dangers, and fix vulnerabilities. You are using a router, you need to set a password that is difficult to crack. If there are new vulnerabilities, you need to update the latest patches in time."

InGuardians security analyst Jay Radcliffe believes that SMEs should also limit their own records of users' private information. He said: "If you don't leave your name and address anywhere, your system will not have your information, and will not be recorded. The transaction between users and vendors through the Internet of Things becomes a trend, this also Open the entire market, it's like you go to a restaurant, they can offer any dish as long as you want to eat."

Schouwenberg said: "After several years of development, the vulnerabilities of new and old equipment being attacked will gradually be repaired. Now, when you become the target of many self-attacks, you become a dangerous complex. Before, the company was very worried about its own Whether security is better than competitors or partners. It is not there now."

He suggested: "Before you add more complex features, make sure you can control the information on existing devices."

WiFi 6 Ceiling Wireless AP

The WiFi 6 Ceiling Wireless AP is a ceiling wireless access point based on the WiFi 6 (802.11ax) standard. It is a device designed to provide wireless Internet connectivity and can be mounted on the ceiling of a building to provide users with high-speed, stable wireless Internet coverage.

WiFi 6 Ceiling Wireless AP offers a number of advantages over previous WiFi standards such as WiFi 5, or 802.11ac. The benefits of WiFi 6 Ceiling Wireless aps and how they affect users are described in detail below.

1. Higher speed and capacity:
WiFi 6 Ceiling Wireless AP uses OFDMA technology (orthogonal frequency division multiple access), which can divide the wireless channel into multiple sub-channels, each sub-channel can transmit multiple data streams at the same time, improving the capacity and efficiency of the network. This means that the WiFi 6 Ceiling Wireless AP can deliver higher speeds and more stable connections to more devices at the same time with the same spectrum resources. For high-density environments, such as office buildings, conference rooms, or large event venues, WiFi 6 Ceiling Wireless AP can better meet users' needs for high-speed networks.

2. Low latency:
The WiFi 6 Ceiling Wireless AP uses Target Wake Time (TWT) technology to put devices to sleep at a predetermined time, reducing communication latency between devices. This is important for real-time applications such as video conferencing, online gaming, and iot devices. A low-latency network can provide a better user experience and support more real-time applications.

3. Better coverage:
The WiFi 6 Ceiling Wireless AP uses higher antenna gain and more advanced beamforming technology to provide wider coverage. This means that in the same environment, the WiFi 6 Ceiling Wireless AP can provide a more stable, longer distance wireless signal, reducing signal attenuation and interference, and improving network reliability and coverage.

4. Better power management:
The WiFi 6 Ceiling Wireless AP uses Target Wake Time (TWT) technology to put the device to sleep for a predetermined amount of time, reducing the power consumption of the device. This is important for battery-powered devices such as smartphones, tablets, and iot devices. Better power management can extend the battery life of the device and reduce frequent charging of the battery.

5. Better security:
WiFi 6 Ceiling Wireless AP uses stronger Encryption algorithms and authentication mechanisms, such as WPA3 encryption and Opportunistic Wireless Encryption (OWE) authentication, to provide better security protection. This is important to protect users' personal information and network data. The WiFi 6 Ceiling Wireless AP also supports more user isolation and guest management features to better protect the network.

In summary, the WiFi 6 Ceiling Wireless AP offers higher speed and capacity, lower latency, better coverage, better power management, and better security than previous WiFi standards. These advantages can provide a better user experience and meet the needs of users for high-speed, stable and secure wireless networks. Whether in the home, office or public space, WiFi 6 Ceiling Wireless AP is an ideal wireless access solution.

Wifi 6 Ceiling Wireless Ap,Access Point Ceiling Mount,Ceiling Access Point Poe Wifi 6,Wireless Mu-Mimo Gigabit Ceiling Access Point

Shenzhen MovingComm Technology Co., Ltd. , https://www.movingcommtech.com

Posted on