To the page content
T IoT

IoT security: recognising and closing security gaps

IoT security is now business-critical: in modern companies, more and more devices are communicating with each other in real time. However, the greater the level of connectivity, the greater the attack surface, as every IoT device is a potential gateway into the company network. According to the report The State of IoT Security 2023 by Forrester Research, IoT devices were even the most frequent target of external attacks last year.

Security vulnerabilities can have serious consequences for companies in particular, such as unexpected production downtime or serious data breaches. Find out here which typical IoT security vulnerabilities can occur and how you can effectively protect your systems against them.

Abstract image of a hard drive with a lock formed from lines.

In brief

  • Challenge: According to studies, IoT devices are the most frequent target of external cyberattacks and represent a large attack surface due to their large number and decentralised management. Security gaps can lead to production downtime or data breaches.
  • Typical vulnerabilities: The most common vulnerabilities include the use of default passwords, unencrypted data transmission (even with common protocols such as MQTT) and a lack of update capability or inadequate physical protection of the devices.
  • Best practices: An effective strategy requires an inventory of all components, network segmentation of IoT devices, the use of strong passwords and role-based access as well as end-to-end encryption and regular security audits.

Definition: IoT security?

Internet of Things security encompasses all technical and organisational measures that protect networked devices and their communication channels from unauthorised access. This includes, for example, encrypted data transmission, device authentication and the targeted partitioning of sensitive network areas.

In contrast to traditional IT security, IoT security not only considers servers and software, but also physical components such as machines, sensors or vehicles. As many of these devices can neither be managed centrally nor updated regularly, conventional protection measures often reach their limits here.

The aim of IoT security is to effectively protect internet-enabled devices, their data streams and the underlying infrastructures from threats. A comprehensive security strategy therefore forms the decisive basis for the successful and trustworthy use of IoT in companies.

Why is IoT security important for companies?

The number of networked devices is growing rapidly: According to a study by the Ponemon Institute from 2022, the average company already manages around 135,000 end devices. This enormous number presents companies with considerable security challenges. One of the biggest challenges is to ensure complete visibility and control over all
IoT devices in use. Without comprehensive knowledge of your own infrastructure, security gaps often remain undetected and cannot be closed effectively. This creates a risky security gap, especially in complex environments with multiple locations or externally integrated devices. To effectively protect IoT systems, companies therefore need an expanded understanding of network security as well as complete transparency of all active components.

Many of these devices also come from different manufacturers with differing security standards. What's more, numerous IoT devices communicate via classic Internet protocols such as TCP/IP - protocols that were not originally developed for today's security requirements. This makes robust IT security for TCP and IoT networks, which also specifically secures these basic communication channels, all the more important.

External threats and protocol risks

  • DNS vulnerabilities: IoT devices often use DNS systems that are susceptible to spoofing, DDoS attacks and DNS tunnelling.
  • IoT botnets: Unprotected devices are frequently recruited into botnets and misused for DDoS attacks.
  • Ransomware attacks: IoT devices are increasingly used as entry points for ransomware attacks, where data can be encrypted or sensitive information stolen.
  • Insecure MQTT connections: MQTT is a commonly used protocol in IoT environments, enabling fast and lightweight data transfer – but it poses security risks if operated without encryption or authentication. Without proper protection, attackers can intercept, manipulate or inject messages.


 

What does "attack surface" mean in the IoT context?

In the context of Internet of Things security, the attack surface describes all potential entry points for cyber criminals that are created by networked devices. In other words, the more devices that are active in the network, the larger the attack surface.

IoT security vulnerabilities: Where are companies particularly vulnerable?

In practice, typical security gaps often arise due to a lack of basic protection measures. These include

Technical vulnerabilities at device level

  • Standard passwords: Devices with preset access data (e.g. "admin/admin") are a frequent gateway and jeopardise the security of IoT devices, especially when they are used in large numbers.
  • Unencrypted communication: Many IoT devices transmit sensitive data unencrypted. If there is no end-to-end encryption, manipulation and data theft are easily possible.
  • Lack of update capability: Some devices cannot be updated or do not receive manufacturer updates, meaning that known IoT security vulnerabilities remain permanently.
  • Low hardware security: For cost reasons, some devices only have minimal security functions. A lack of TPMs, open interfaces or unsecured memory areas make these devices more susceptible to attacks.

External threats and protocol risks

  • DNS vulnerabilities: IoT devices often use DNS systems that are susceptible to spoofing, DDoS attacks and DNS tunnelling.
  • IoT botnets: Unprotected devices are often part of botnets and misused for DDoS attacks.
  • Ransomware attacks: IoT devices are increasingly being used as entry points for ransomware attacks in which data can be encrypted or sensitive information stolen.
  • Insecure MQTT connections: MQTT is a frequently used protocol in IoT environments. It enables fast, lean data transmission, but poses security risks if it is operated unencrypted or without authentication. Without protection, attackers can read and modify messages or infiltrate their own commands.

Structural weaknesses in administration and architecture

  • Lack of transparency and shadow IoT: Without a complete overview of IoT components, security gaps cannot be recognised or closed. Shadow IoT devices that are not officially managed are beyond any control.
    Physical manipulation: In many industries, IoT devices are freely accessible and therefore vulnerable to direct access, data theft or manipulation.
    Insufficient monitoring: Without real-time monitoring, suspicious activities remain undetected for a long time, which increases the risk.
    No end-to-end encryption strategy: If there is no systematic encryption, devices remain vulnerable.

Technical weaknesses at device level

  • Standard passwords: Devices with preset access data (e.g. "admin/admin") are a frequent gateway and jeopardise the security of IoT devices, especially when they are used in large numbers.
  • Unencrypted communication: Many IoT devices transmit sensitive data unencrypted. If there is no end-to-end encryption, manipulation and data theft are easily possible.
  • Lack of update capability: Some devices cannot be updated or do not receive manufacturer updates, meaning that known IoT security vulnerabilities remain permanently.
  • Low hardware security: For cost reasons, some devices only have minimal security functions. A lack of TPMs, open interfaces or unsecured memory areas make these devices more susceptible to attacks.

Similar use case or any questions?

Simply fill out the contact form – we’ll get back to you as soon as possible.

Structural weaknesses in management and architecture

  • Lack of transparency and shadow IoT: Without full visibility of all IoT components, vulnerabilities cannot be identified or addressed. Shadow IoT devices that are not officially managed fall completely outside of control.
  • Physical manipulation: In many industries, IoT devices are freely accessible and therefore prone to direct access, data theft or tampering.
  • Insufficient monitoring: Without real-time monitoring, suspicious activities often go unnoticed for a long time – increasing the risk.
  • Missing end-to-end encryption strategy: Without a consistent encryption approach, devices remain exposed to attacks.

Best practices for IoT security

An effective IoT security strategy combines technical measures and binding standards at all levels - from the device to the cloud. The following best practices help to close vulnerabilities in a targeted manner:

  • Strong passwords and access protection: Avoid standard passwords. Instead, use complex, regularly updated access data and supplement this with two-factor authentication or role-based access rights.
  • Network segmentation: Operate IoT devices in separate network areas (VLAN or dedicated mobile network) to contain attacks.
  • Certified devices: Use standards such as ETSI EN 303 645 and the BSI test specifications and conformity tests to rely on tested quality when selecting secure components.
  • Inventory of all IoT components: Completely record all devices in order to monitor and protect them in a targeted manner.
  • Comprehensive encryption: Encrypt data both during transmission and on the devices.
  • Automated monitoring and vulnerability scans: Real-time monitoring and automated scans enable rapid risk detection and elimination.
  • Conduct regular security audits: Technical audits and penetration tests help to detect IoT security vulnerabilities at an early stage and continuously monitor the security level.
  • Establish awareness and training: Raise your employees' awareness through regular training to minimise risks when handling IoT devices.
  • Protection against physical access: Security measures such as a robust housing with tamper protection or access restrictions help to better protect freely accessible devices against physical access.
  • Embedding security governance: Clear responsibilities, binding guidelines and regular training form the foundation of a sustainable IoT security strategy.

Optimum IoT security with Deutsche Telekom

The more intensively companies use IoT technologies, the more important it becomes to secure them. Even a single compromised device can jeopardise entire processes. IoT security must therefore be an integral part of any digital strategy. Companies that rely on clear standards, secure architectures and certified components at an early stage improve their competitive position in the long term.

Deutsche Telekom offers suitable infrastructure solutions for this, such as high-performance IoT connectivity via mobile communications and scalable, secure network solutions.

IoT Connectivity

A satellite orbits the Earth, surrounded by pink and blue data streams for global IoT connectivity

IoT Connectivity

The right IoT connectivity coordinates IoT connections across platforms, integrates devices and data via API, and enables global control with the highest security standards. You can manage your IoT projects flexibly, efficiently, and independently of manufacturers.

Potrait photo Annalena Rauen

Annalena Rauen

Marketing Manager IoT

Back in 2016, Anna worked on IoT topics at Deutsche Telekom for the first time. Since then, she has been supporting customer best practices in a wide range of industries – always focusing on the benefits that the Internet of Things can provide. Her IoT blogposts describe real use cases and the value these innovations add to market players, their business models, and even entire industries.

Curious? Find out more now:

Transforming Construction Sites with IoT

Skilled labor shortage, declining order volumes due to high material costs, and rising energy prices – the construction industry faces numerous challenges. But what exactly does "digital construction site" mean? Learn more in this blog article!

Read article

IoT Devices: The Future of Connected Technology

IoT devices are revolutionizing the business world: with real-time data and predictive maintenance, they not only enhance production processes but also offer entirely new business opportunities and innovation potentials. Find out more about the topic in this article!

Read article