• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
Network Security, News

IoT Growth is Great, But It’s Causing SMB Security Risks

SMB security risks are more numerous in this age of IoT expansion. Here are the most prominent challenges to security caused by new developments in tech.

June 26, 2019 Terry Hearn 1 Comment

smb cloud security, SMBs, smb security risks

As small businesses continue to battle traditional issues of time and resources, the rapid growth of the Internet of Things (IoT) is adding SMB security risks for teams to manage.

While there are certainly many benefits to implementing IoT in terms of efficiency and logistics, such a rapid growth in the number of endpoints connected to a company’s network immediately brings with it increased security risks.

Considering the number of organisations that have been hit by cyber-attacks and suffered data breaches in recent years (43% of cyberattacks target small businesses), it is increasingly clear that security should be a primary consideration for SMBs when introducing any new devices into the office environment.

This article looks at the challenges to security that are caused by new developments in technology and how SMBs can manage that threat.

Why is IoT a security concern?

All of the possible locations that could become a point of entry for malicious software or third parties to exploit and gain access to a company are known as the attack surface.

From lighting to printers, an increasing number of modern devices in the office space require some form of internet connectivity to function. Juniper have estimated that the number of IoT devices will pass the 50 billion mark by 2022.

Couple this with the increased use of personal devices for mobile working and it is clear to see that attack surfaces for SMBs are rapidly expanding as technology pushes the number of endpoints to keep rising.

Any individual device could be breached or used as a point of entry for hackers, and so having an increasingly large number of devices to manage mean that risk is greatly multiplied.

Without effective IoT security measures, sensitive data is at risk of being intercepted by the hacking of otherwise innocuous devices such as printers, thermostats and locks.

How can the risks be reduced?

While the range of devices will vary from company to company, there are a number of universal precautions that SMBs can take to minimize SMB security risks from IoT:

Improved endpoint security

Ensuring your security software is up-to-date and secure is vital for identifying and protecting against malware and other malicious software.

In addition to antivirus and a firewall for detecting and removing threats, endpoint security solutions should go a step further and help to protect against threats that are not detected using traditional security software.

This could include tools to identify phishing emails, scanners to detect WiFi vulnerabilities and encryption and secure storage for documents and files.

Strong passwords

The first rule of cybersecurity is to use strong passwords, and this is especially true for networks that include IoT devices. While devices such as smart speakers are simple to connect to the network, many people do not think to change the default passwords, essentially meaning that a potential hacker has access to your network with minimal effort.

The Avast Smart Home Report 2019 found that 40% of smart homes have at least one vulnerable device, and 69.2% of these are vulnerable due to weak security credentials. As use of these devices moves from the home to the office, it is vitally important that SMB security risks like these are addressed.

Strong passwords on every device are a vitally important step to prevent a breach and should be accompanied by two-factor authentication wherever possible.

Patches

Security patches are simple, but crucial to secure devices and ensure that vulnerabilities do not compromise your network. Patches are often quick and simple to apply and in some cases can be automated.

While there is a temptation to click ‘remind me later’, network security is only as strong as your weakest link, so every device connected to your network should be updated as soon as patches become available.

Related: 3 Tips to Better Manage Your IoT Business Needs

This can present a challenge for SMBs with limited resources and a minimal number of IT specialists. In addition to updating servers and laptops, IoT introduces a dramatic increase in the number of devices that need to be updated.

To prevent this causing a delay in some devices receiving patches, the responsibility should be shared among all staff. If everybody updates their own devices, security becomes a topic for the wider company, a positive step towards improved best practices.

Staff training

As important as updated security software is, cybersecurity has to be multi-layered. Threats are continually evolving and while firewalls and malware scanners can be updated and will protect against certain types of threat, they will not prevent someone accidentally opening a phishing email, for example.

Every year, human error accounts for a significant number of data breaches, far more than targeted or malicious attacks. In 2018, UK’s Information Commissioner’s Office (ICO) found that 88% of breaches were the result of human error rather than targeted attacks.

Terry Hearn is a researcher and copywriter, working for a number of international cyber security brands including Avast Business. His professional work covers topics from consumer tech to business data protection, and outside of the office he sidelines in covering the latest sporting news.

To minimise this risk, SMBs should ensure that staff at all levels of the company are following security best practices, such as utilising strong passwords, two-factor authentication and applying patches and updates as soon as they become available.

This should also be supported by regular training and a bring your own device (BYOD) policy for mobile workers.

The landscape surrounding SMB security risks is evolving. To combat this, it is crucial that small businesses take the time to carefully monitor the attack surface of their company and balance the addition of new IoT devices against the potential security risk that they may bring with them.

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: Cyber Security, Data Security, Internet of Things

Related Content:

  • Cloud, SASE, Aryaka How the Cloud is Redefining Media Production and…
  • Singlewire Software mass notification interview Singlewire Software on Mass Notification Solutions
  • URI catchbox 1 Catchbox Plus: The Mic Solution That Finally Gave…
  • Engaging virtual meeting with diverse participants discussing creative ideas in a bright office space during daylight hours Diversified Survey: Workplace AV Tech is Falling Short,…

Free downloadable guide you may like:

  • Download TechDecisions' Blueprint Series report on Security Awareness now!Blueprint Series: Why Your Security Awareness Program is Probably Falling Short

    Learn about the evolution of phishing attacks and best practices for security awareness programs to ensure your organization is properly prepared to defend against them in this report from TechDecisions' Blueprint Series.

Reader Interactions

Comments

  1. canon pixma mg2922 says

    July 10, 2019 at 3:41 am

    This is so great to see this is really a great growth rate of IoT. IoT is now in the trend. It’s really great to see that you are discussing the security risks. It’s really so much informative. Overall well penned.

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.