Business

5G, IoT and sex toys on the menu for cyberthreats in 2021

With the rise of 5G, IoT devices are becoming prime targets for cybercriminals. Lack of control, vulnerabilities in webcams or connected sex toys increase the risks. Discover the security challenges associated with connected objects and solutions to protect corporate networks and personal data.

5G, IoT and sex toys on the menu for cyberthreats in 2021

IoT device security in the 5G era: a major challenge

With the rise of 5G, IoT (Internet of Things) devices are becoming prime targets for cybercriminals. Lack of control over access, device vulnerabilities, and the risks associated with unsecured connected objects represent increasingly pressing threats for businesses and individuals alike.

The rise of IoT threats with 5G

The arrival of 5G, which will multiply the number of connected devices, makes security management more complex. Cybersecurity firm Check Point warns of the increasing difficulty of protecting data from these devices, especially as many escape the control of corporate security systems.

The distributed nature of 5G networks and the use of a third-party provider to connect these objects reduces threat visibility and access control. The majority of IoT devices connected to these networks have only basic security, such as a simple password, leaving loopholes open.

The risks of unauthorized devices

Another challenge is the use of IoT devices not approved by companies. According to Check Point, 90% of companies have installed unvalidated connected objects on their networks, often without the consent or knowledge of IT teams. This phenomenon, known as Shadow IT, complicates the management of security risks.

Security solutions: software micro-agents

To secure these complex IoT environments, Check Point recommends the use of software micro-agents. These small plug-ins, capable of running on any device or system, control data traffic and reinforce the protection of 5G networks by connecting to a consolidated security architecture.

The vulnerability of webcams and connected sex toys

With the increase in teleworking, webcams and other connected objects in the home are becoming prime targets. These sometimes vulnerable devices can enable cybercriminals to penetrate corporate networks. Other less conventional objects, such as connected sex toys, are also potential threats. These devices, often associated with cloud applications, can be used to install malware or carry out denial-of-service (DDoS) attacks.

Eset, an antivirus vendor, highlights the risks associated with these objects, such as the example of a cyberattack that took control of a connected chastity belt.

Conclusion

IoT devices are being used more and more, but their security is a major issue. Whether for businesses or individuals, it's crucial to pay attention to the vulnerabilities of connected objects, adopt appropriate security solutions and raise awareness among users, especially when it comes to personal objects such as connected sex toys.

 

Source : ICTjournal

Technological, Security, Marketing, Regulation, Business
2 min read
Dec 10, 2020
By L. F.
Share

Related posts

Jan 28, 2025 • 3 min read
Why all the buzz around Deepseek?

Discover Deepseek, the Chinese startup shaking up AI with its open-source R1 model. Free and highly...

Jan 27, 2025 • 2 min read
With Operator, OpenAI's ambitions in agentic AI are becoming clearer

Discover OpenAI's Operator, an AI agent that redefines web task automation. Capable of filling forms...

Dec 16, 2024 • 2 min read
The Federal Council defines its digital strategy for 2025

Discover Switzerland's Digital Strategy for 2025, focusing on artificial intelligence (AI), cybersec...