According to research by IOTForAll, hospitality is successfully using IoT to make radical leaps forward in guest satisfaction, employee productivity, and environmental sustainability while decreasing unnecessary costs and labor.
For example, “A smart energy management system knows when a guest room is unoccupied and can automatically adjust the temperature to reduce energy consumption by as much as 20-45 percent,” according to Telkonet. Those utility savings translate into significant margin growth and definite gains in environmental sustainability.
The dark side of this explosive IoT growth is the concomitant increase in cybersecurity risk. Each device incorporated into a hotel’s digital infrastructure opens an additional vector for exploitation by hackers. The most recent headline-grabbing example: a hacker accessed the high-roller database of a major Las Vegas casino through a smart thermometer in the lobby fish tank.
The attackers used the thermostat to get a foothold in the network. Then, they pivoted across a segmented network to access the crown jewels: the high-roller database.
This attack is demonstrative of the significant level of risk posed by IoT devices in hospitality today. In this case, the hacker was able to penetrate a network, pivot, and exfiltrate confidential data without touching many traditional endpoints. That means that your existing endpoint monitoring, intrusion detection systems, and log aggregators would likely have never seen this activity – no matter how sophisticated they are.
It is also important to note that in these types of attacks, hackers often have the opportunity to do even greater harm. There could be power distribution units on the network susceptible to N-day vulnerabilities that would have enabled a sophisticated attacker to power down parts of the casino’s network. Security cameras could have been accessible and used for physical surveillance. System backups on a NAS could be destroyed or ransomed. All of these attacks are possible today.
The reason these attacks work well and go undetected for so long is because today’s enterprise security stack simply was not designed to handle myriad unmanaged, single-purpose, black-box devices. The entire industry has been designed to protect powerful, transparent, multi-function endpoints that can be monitored and inspected. Traditional endpoints have their own challenges (like humans running arbitrary software on them), so it is not a matter of one type of security being easier than the other. It is simply that IoT security is different than traditional IT security. IoT endpoints have very different behaviors and security characteristics, and thus, a new solution is needed.
Today’s security stack is fundamentally broken when it comes to IoT. Most organizations cannot even identify the devices on their networks – let alone detect and respond to attacks. Finite State is offering our partners a new security stack that is designed from the ground up to fill gaps created by black box IoT devices. Our team, including some of the best IoT hackers in the world, has compiled the largest data set of IoT risk and attack data available, and we are making that available to you in our suite of products. Stakeholders across hospitality enterprises cannot depend on manufacturers alone to provide security for your IoT deployments. The hospitality industry needs IoT security today.