perle-logo perle-logo perle-logo
  • Contact Us
  • PRODUCTS
  • APPLICATIONS
  • HOW TO BUY
  • SUPPORT
  • ABOUT PERLE
  1. Industry News
  2. New IoT security bill passes the House with bipartisan support
  3. Print Friendly Version of this pagePrint Get a PDF version of this webpagePDF

9/22/2020

New IoT security bill passes the House with bipartisan support

Max Burkhalter

New IoT security bill passes the House with bipartisan support

The internet of things has become near-ubiquitous in businesses and households across the U.S., raising questions about the security of devices that possess this functionality. IoT products that are able to connect to the internet may offer a new level of convenience and efficiency, but they also come with a deluge of cyber security concerns.

For one, there are currently no industry standards for this branch of technology, and many end users are unaware of how the devices can be leveraged to steal personal information. Factory settings are another key issue — using the Shodan search engine, hackers can collect detailed information on active, internet-connected devices. Once identified, malicious actors can use default login credentials to gain access and control over unsecured endpoints.

Bipartisan IoT bill seeks to enhance federal network security
Back in March 2018, Lt. Gen. Robert Ashley, director of the Defense Intelligence Agency, spoke with the Senate Armed Services Committee about emerging cyber risks. According to Ashely, one of the biggest threats to national security is the exploitation of "our weakest technology components: mobile devices and the internet of things." Alongside brute-force attacks, these components are vulnerable to social engineering operations, and these intrusions can lead to data leaks and the theft of intellectual property.


Digital representation of governmentProtecting vulnerable IoT devices has become a matter of national security.

To offset these risks, a group of bipartisan lawmakers began drafting a new IoT security bill that would set minimum standards for any devices connected to federal networks. This bill, named The IoT Cybersecurity Improvement Act, gained support from both sides of the aisle and was officially passed by the House on September 14, 2020. The bill is currently waiting for a Senate floor vote before it can make its way to the president's desk. Once passed, the bill will enact the following provisions:

  • Creating best practices for IoT device security: The National Institute of Standards and Technology plays a key role in protecting U.S. infrastructure and citizens from cybersecurity threats. If passed, the IoT security bill would require the NIST to create a set of best practices for any device with internet connectivity that is used on federal networks. Once these standards are set, the Office of Management and Budget will be responsible for creating guiding resources to help federal agencies meet or exceed the NIST's recommendations.
  • Streamlining vulnerability disclosures: Every piece of hardware and software must be continually patched to prevent hackers from leveraging code-level bugs, outdated firmware and zero-day exploits. The IoT Cybersecurity Improvement Act would require the Department of Homeland Security to publish guidance on "coordinated vulnerability disclosures" related to agency devices. This will allow greater collaboration between the NIST, federal agencies, third-party vendors and other external partners involved in managing or patching IoT devices.
  • Limiting IoT devices that can be purchased by the federal government: The IoT security bill also limits the internet-connected devices that the federal government can purchase and deploy. Any device that does not meet the NIST's minimum security standards should be prevented from connecting to federal networks. Of course, this will require researchers to perform a comprehensive assessment of all the technologies currently in use. Those that fall short of the NIST's guidelines will likely be replaced with more secure alternatives.

While the IoT security bill is aimed at protecting federal networks, many are hopeful that this legislation marks a turning point for consumers and businesses as well. Once the NIST has created clear standards for the secure development, identity management and patching of internet-connected devices, IoT manufacturers may start incorporating these guidelines into their products.

Built-in security standards for commercial IoT devices
As it stands, consumer and business IoT are highly vulnerable to exploitation due to the lack of unified standards. With an estimated 20.8 billion connected devices set to be in use by the end of 2020, according to research from Gartner, there's a growing concern that technological innovation will outpace cybersecurity protections. This issue is especially stark for enterprises that manage large IoT ecosystems, as it can be difficult to bring every device under one, simplified security framework. As Kaspersky Labs explained, businesses should take the following steps to secure IoT devices while waiting for NIST to set standards on commercial products:

  • Closely monitor all mobile devices, including smartphones, tablets and wearable IoT
  • Set up automated antivirus updates and patching schedules
  • Ensure all IoT devices have strong login credentials
  • Integrate end-to-end encryption to protect data in transit
  • Disable any unused features on devices to prevent remote access attacks

Alongside these IoT management tips, it's also important for businesses to have reliable networking equipment that can keep data flowing when it matters most. That's why Perle offers industrial-grade connectivity tools that can help companies create a secure IoT environment. Our LTE Routers can help minimize downtime and bring distributed sites online faster.

To learn more, explore our customers' success stories.

Related Articles
  • Security researchers warn of new botnet with "bricking" capabilities
  • Data security remains a top concern for cloud transformations
  • Researchers find new IoT security risk: Bluetooth spoofing
Related Products
  • Console Servers
Back to top

Products

Applications

About Perle

Contact Us

How to Buy

Technical Support

Site Map

Legal Information

Privacy & Cookie Policy

Products by Perle

specialix Chase Research

Follow Perle

Go to Perle Systems Facebook link
Go to Perle Systems Twitter link
Go to Perle Systems Linkedin page
Go to Perle Systems rss feed

Copyright © 1996 - 2021 Perle. All Rights Reserved

×

Trusted by renowned brands

  • Amazon
  • Cisco
  • Boeing

Why us?

Technical Support icon
Technical Support

If you need a technical consultation (by phone or email) to help you choose the best Products for your application, Perle is easy to reach and has technical engineers you can talk to. We have sales and technical support staff around the globe to support you when you need it.

Trust icon
Trust

Perle has been providing reliable device connectivity solutions since 1976. That’s over 40 years of experience that businesses around the globe have come to trust to deliver superior connectivity technology for mission critical applications.

Send us an Email

Have a Question?

We can provide more information about our products or arrange for a price quotation.


email-iconSend an Email
contactus-iconSend an Email callus-iconCall Us