{"id":54579,"date":"2022-08-10T14:20:45","date_gmt":"2022-08-10T06:20:45","guid":{"rendered":"https:\/\/version-2.com\/?p=54579"},"modified":"2022-08-18T10:43:11","modified_gmt":"2022-08-18T02:43:11","slug":"iot-internet-of-things-vs-internet-of-threats","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2022\/08\/iot-internet-of-things-vs-internet-of-threats\/","title":{"rendered":"IOT: INTERNET OF THINGS VS. INTERNET OF THREATS"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"54579\" class=\"elementor elementor-54579\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"text-base leading-normal text-left text-h3 text-black\">Internet of Things (IoT) is a rapidly growing industry. It is forecasted that in 2025 there will be 152,200 IoT devices connecting to the internet every minute. Nowadays, modern businesses utilize IoT technologies such as remote healthcare medical devices, agricultural drones, intelligent production lines, and financial modeling systems to reduce costs, increase productivity, and perform economic forecasts. But users often forget about these technologies&#8217; security aspects, making them an easy target for cybercriminals. Therefore, in this blog, we will discuss how to secure your IoT devices and protect yourself from potential cyber-attacks.<\/p>\n\n<div><\/div>\n<div class=\"my-64 text-center\">\n<div style=\"display: inline-block; max-width: 100%; overflow: hidden; position: relative; box-sizing: border-box; margin: 0px;\">\n<div style=\"box-sizing: border-box; display: block; max-width: 100%;\"><img decoding=\"async\" style=\"max-width: 100%; display: block; margin: 0px; border: none; padding: 0px;\" role=\"presentation\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMTIwMCIgaGVpZ2h0PSI2NzUiIHhtbG5zPSJodHRwOi8vd3d3LnczLm9yZy8yMDAwL3N2ZyIgdmVyc2lvbj0iMS4xIi8+\" alt=\"\" aria-hidden=\"true\" \/><\/div>\n<img decoding=\"async\" style=\"position: absolute; inset: 0px; box-sizing: border-box; padding: 0px; border: none; margin: auto; display: block; width: 0px; height: 0px; min-width: 100%; max-width: 100%; min-height: 100%; max-height: 100%; object-fit: contain; filter: none; background-size: cover; background-image: none;\" src=\"https:\/\/res.cloudinary.com\/nordsec\/f_auto,c_limit,w_3840,q_auto\/v1\/nord-security-web\/blog\/categories\/cybersecurity\/2022\/05\/Blog_image_size_1280x720.png\" srcset=\"https:\/\/res.cloudinary.com\/nordsec\/f_auto,c_limit,w_1200,q_auto\/v1\/nord-security-web\/blog\/categories\/cybersecurity\/2022\/05\/Blog_image_size_1280x720.png 1x, https:\/\/res.cloudinary.com\/nordsec\/f_auto,c_limit,w_3840,q_auto\/v1\/nord-security-web\/blog\/categories\/cybersecurity\/2022\/05\/Blog_image_size_1280x720.png 2x\" alt=\"Blog image size 1280x720\" \/>\n\n<\/div>\n<p class=\"text-nano leading-normal text-left text-center text-gray-600 my-8\"><\/p>\n\n<\/div>\n<div class=\"style_postContent__2n3xN text-black break-words\" data-content-type-blog=\"\">\n<div class=\"Article_wrapper__2ddM4\">\n<h2 id=\"What are IoT devices?\" class=\"text-h2 leading-none text-left\"><b>What are IoT devices?<\/b><\/h2>\n<p class=\"text-base leading-normal\">The Internet of Things (IoT) is a network of physical items implanted with sensors, software, and other technologies that act on the collected data via machine learning. They are devices created to adapt to users\u2019 daily needs and improve daily repetitive tasks. It can be anything from intelligent kids&#8217; toys or smart home appliances to healthcare devices, vehicles, etc.<\/p>\n<p class=\"text-base leading-normal\">However, businesses use IoT technology on a larger scale, starting with smart office systems that include smart locks, remote security cameras, and climate control, and ending with complex solutions, such as digital financial modeling, AI-based management solutions, intelligent factory systems, autonomous agriculture, etc.<\/p>\n\n<h2 id=\"How IoT is transforming businesses\" class=\"text-h2 leading-none text-left\"><b>How IoT is transforming businesses<\/b><\/h2>\n<p class=\"text-base leading-normal\"><a class=\"cursor-pointer outline-none transition-colors duration-250 ease-out text-blue-500 hover:text-blue-600 focus:text-blue-400\" href=\"https:\/\/www.mckinsey.com\/industries\/private-equity-and-principal-investors\/our-insights\/growing-opportunities-in-the-internet-of-things\" target=\"_blank\" rel=\"noopener noreferrer\">Research<\/a> shows that companies who utilized IoT devices for a year noticed these positive trends: improved productivity, reduced labor, increased worker safety, etc.<\/p>\n<p class=\"text-base leading-normal\">Here are a few examples of how IoT improves business solutions:<\/p>\n\n<ol>\n \t<li class=\"ml-20\">\n<div>\n<p class=\"text-base leading-normal\">They help you <b>manage and track your inventory<\/b> by providing various remote control choices.<\/p>\n\n<\/div><\/li>\n \t<li class=\"ml-20\">\n<div>\n<p class=\"text-base leading-normal\">They are becoming smarter with every connection to the device &#8211; the more they track, the more they learn about the patterns, and by doing so, they <b>optimize the user\u2019s experience. <\/b><\/p>\n\n<\/div><\/li>\n \t<li class=\"ml-20\">\n<div>\n<p class=\"text-base leading-normal\">They<b> innovate businesses<\/b> with the help of predictive maintenance. For example, these devices will help monitor your harvest if you work in agriculture.<\/p>\n\n<\/div><\/li>\n \t<li class=\"ml-20\">\n<div>\n<p class=\"text-base leading-normal\">They <b>reduce waste<\/b> by improving power management and water consumption, making businesses more eco-friendly.<\/p>\n\n<\/div><\/li>\n \t<li class=\"ml-20\">\n<div>\n<p class=\"text-base leading-normal\">They <b>reduce human labor<\/b> by automating repetitive tasks and helping to allocate workforce resources to more complex tasks.<\/p>\n\n<\/div><\/li>\n \t<li class=\"ml-20\">\n<div>\n<p class=\"text-base leading-normal\">They automatically schedule and control various production tasks, <b>increasing productivity.<\/b><\/p>\n\n<\/div><\/li>\n \t<li class=\"ml-20\">\n<div>\n<p class=\"text-base leading-normal\">They<b> assist in maintenance<\/b>. For example, IoT devices measure temperature, humidity, and other indicators to achieve necessary storage conditions.<\/p>\n\n<\/div><\/li>\n \t<li class=\"ml-20\">\n<div>\n<p class=\"text-base leading-normal\">They <b>can<\/b> even <b>prevent diseases or health issues<\/b> by tracking necessary health data, such as blood sugar levels, and reminding about insulin injections.<\/p>\n\n<\/div><\/li>\n<\/ol>\n<h2 id=\"The hidden dangers of IoT\" class=\"text-h2 leading-none text-left\"><b>The hidden dangers of IoT<\/b><\/h2>\n<p class=\"text-base leading-normal\">The advantages are outstanding, but many IoT devices still don&#8217;t meet the minimum cybersecurity standards. If not secured, they\u2019re sensitive to cyberattacks, such as an <a class=\"cursor-pointer outline-none transition-colors duration-250 ease-out text-blue-500 hover:text-blue-600 focus:text-blue-400\" href=\"https:\/\/www.engineering.com\/story\/lessons-from-the-tesla-hack-automotive-iot-security\" target=\"_blank\" rel=\"noopener noreferrer\">incident with a hijacked Tesla<\/a> when the attackers gained access to car control while it was driving.<\/p>\n<p class=\"text-base leading-normal\">The number of cyberattacks on IoT devices is growing at alarming rates. In the first half of 2021, it was <a class=\"cursor-pointer outline-none transition-colors duration-250 ease-out text-blue-500 hover:text-blue-600 focus:text-blue-400\" href=\"https:\/\/threatpost.com\/iot-attacks-doubling\/169224\/\" target=\"_blank\" rel=\"noopener noreferrer\">twice as high<\/a> as the total number of attacks in 2020. Here are the most frequent types of threats carried out against IoT devices:<\/p>\n\n<ul class=\"list-disc ml-24\">\n \t<li class=\"ml-20\">\n<div>\n<p class=\"text-base leading-normal\"><b>DoS (denial-of-service) attacks<\/b> are carried out to take down company online assets and steal their sensitive data.<\/p>\n\n<\/div><\/li>\n \t<li class=\"ml-20\">\n<div>\n<p class=\"text-base leading-normal\"><b>Brute-force password attacks<\/b> lead to criminals gaining access to a particular device.<\/p>\n\n<\/div><\/li>\n \t<li class=\"ml-20\">\n<div>\n<p class=\"text-base leading-normal\"><b>Firmware hijacking<\/b> is used to access a device when software is downloaded from an illegitimate source.<\/p>\n\n<\/div><\/li>\n \t<li class=\"ml-20\">\n<div>\n<p class=\"text-base leading-normal\"><b>Eavesdropping attack<\/b> occurs when a hacker intercepts, deletes or changes data sent between two devices.<\/p>\n\n<\/div><\/li>\n<\/ul>\n<h2 id=\"Top causes making IoT devices insecure\" class=\"text-h2 leading-none text-left\"><b>Top causes making IoT devices insecure<\/b><\/h2>\n<p class=\"text-base leading-normal\"><a class=\"cursor-pointer outline-none transition-colors duration-250 ease-out text-blue-500 hover:text-blue-600 focus:text-blue-400\" href=\"https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S1353485814700753.\" target=\"_blank\" rel=\"noopener noreferrer\">A recent study<\/a> addressed the most common IoT security issues: lack of personal information privacy, unprotected software, insecure web, weak passwords, and lack of encryption. In general, many people and businesses don&#8217;t prioritize security simply because they are unaware of why they need it. Unlike laptops and other types of consumer electronic hardware, many of these devices <a class=\"cursor-pointer outline-none transition-colors duration-250 ease-out text-blue-500 hover:text-blue-600 focus:text-blue-400\" href=\"https:\/\/securityintelligence.com\/articles\/iot-security-internet-forgotten-thing\/\" target=\"_blank\" rel=\"noopener noreferrer\">don\u2019t have built-in security<\/a> that provides regular security updates.<\/p>\n<p class=\"text-base leading-normal\">Another issue is that people don&#8217;t change the initial default settings and leave them as they were after setting up IoT devices at their home or office. Many off-brand IoT producers manufacture devices with fewer resources and cheaper components that usually are insecure, creating an ever-increasing threat to the device owners.<\/p>\n\n<h2 id=\"How to secure your business IoTs\" class=\"text-h2 leading-none text-left\"><b>How to secure your business IoTs<\/b><\/h2>\n<p class=\"text-base leading-normal\">The main problem for businesses is that they have too many devices and don\u2019t usually supervise them. That creates security gaps in your cybersecurity and opens the doors for eager cybercriminals. So, here are 10 steps for how you can secure your business IoT devices:<\/p>\n\n<ol>\n \t<li class=\"ml-20\">\n<div>\n<p class=\"text-base leading-normal\"><b>Understand the current IoT assets.<\/b> Run an internal audit to determine how many and what kind of IoT devices you have and who has the access.<\/p>\n\n<\/div><\/li>\n \t<li class=\"ml-20\">\n<div>\n<p class=\"text-base leading-normal\"><b>Monitor ALL the devices. <\/b>Keep an eye on all of your devices to protect them from being infected &#8211; utilize a tech solution to automate this process.<\/p>\n\n<\/div><\/li>\n \t<li class=\"ml-20\">\n<div>\n<p class=\"text-base leading-normal\"><b>Apply a tracking system.<\/b> Implement an identity and access management (IAM) solution that will allow you to track which IoT devices are active and when they go online and offline.<\/p>\n\n<\/div><\/li>\n \t<li class=\"ml-20\">\n<div>\n<p class=\"text-base leading-normal\"><b>Build an internal security system.<\/b> Block any potential threat by using network <a class=\"cursor-pointer outline-none transition-colors duration-250 ease-out text-blue-500 hover:text-blue-600 focus:text-blue-400\" href=\"https:\/\/nordlayer.com\/blog\/what-is-network-access-control-and-why-is-it-important\/\" target=\"_blank\" rel=\"noopener noreferrer\">access control (NCA) technologies<\/a> that authenticate and authorize network users to access your company\u2019s information.<\/p>\n\n<\/div><\/li>\n \t<li class=\"ml-20\">\n<div>\n<p class=\"text-base leading-normal\"><b>Remove all data from old devices. <\/b>Pay attention to the devices that aren\u2019t in use anymore, as they may store important information. After removing all data, consider returning them to manufacturers for recycling.<\/p>\n\n<\/div><\/li>\n \t<li class=\"ml-20\">\n<div>\n<p class=\"text-base leading-normal\"><b>Choose reliable suppliers. <\/b>Pay attention to the manufacturer of your IoT devices, because it\u2019s very important to know whether the device comes with built-in security and how you should update it from reliable sources in the future.<\/p>\n\n<\/div><\/li>\n \t<li class=\"ml-20\">\n<div>\n<p class=\"text-base leading-normal\"><b>Keep the devices up-to-date.<\/b> Various software updates bring bug fixes and security patches, so it&#8217;s essential to be updated regularly.<\/p>\n\n<\/div><\/li>\n \t<li class=\"ml-20\">\n<div>\n<p class=\"text-base leading-normal\"><b>Make unlockable passwords<\/b>. Build strong password combinations consisting of various symbols, letters, and numbers to make them hard to crack. Also, <a class=\"cursor-pointer outline-none transition-colors duration-250 ease-out text-blue-500 hover:text-blue-600 focus:text-blue-400\" href=\"https:\/\/nordvpn.com\/password-manager\/\" target=\"_blank\" rel=\"noopener noreferrer\">creating a master password<\/a> would do the trick if the devices are connected to a phone, tablet, or computer.<\/p>\n\n<\/div><\/li>\n \t<li class=\"ml-20\">\n<div>\n<p class=\"text-base leading-normal\"><b>Guarantee IoT security.<\/b> Ensure that you are using port security, invest in a network intrusion detection system, disable port forwarding, and use security solutions like <a class=\"cursor-pointer outline-none transition-colors duration-250 ease-out text-blue-500 hover:text-blue-600 focus:text-blue-400\" href=\"https:\/\/nordvpn.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">VPN<\/a> and firewalls.<\/p>\n\n<\/div><\/li>\n \t<li class=\"ml-20\">\n<div>\n<p class=\"text-base leading-normal\"><b>Secure the Wi-Fi.<\/b> Last but not least, ensure the Wi-Fi router\u2019s safety &#8211; strengthen the router firewall, deactivate WPS, and enable the WPA2 protocol. And, as always, use a strong password for it!<\/p>\n\n<\/div><\/li>\n<\/ol>\n<\/div>\n<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"54571\" class=\"elementor elementor-54571\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6b25dc0d elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"6b25dc0d\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3cc1b37d\" data-id=\"3cc1b37d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-52c4a230 elementor-widget elementor-widget-text-editor\" data-id=\"52c4a230\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Nord Security<\/strong><br \/>The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Internet of Things (IoT) is a rapidly growing industry. [&hellip;]<\/p>","protected":false},"author":143524195,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[973,488,61],"tags":[489,974],"class_list":["post-54579","post","type-post","status-publish","format-standard","hentry","category-nord-security","category-488","category-press-release","tag-489","tag-nord-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IOT: INTERNET OF THINGS VS. INTERNET OF THREATS - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nordsecurity.com\/blog\/iot-internet-of-things-vs-internet-of-threats\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IOT: INTERNET OF THINGS VS. INTERNET OF THREATS - Version 2\" \/>\n<meta property=\"og:description\" content=\"Internet of Things (IoT) is a rapidly growing industry. [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nordsecurity.com\/blog\/iot-internet-of-things-vs-internet-of-threats\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-10T06:20:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-18T02:43:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/res.cloudinary.com\/nordsec\/f_auto,c_limit,w_3840,q_auto\/v1\/nord-security-web\/blog\/categories\/cybersecurity\/2022\/05\/Blog_image_size_1280x720.png\" \/>\n<meta name=\"author\" content=\"version2hk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"version2hk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nordsecurity.com\\\/blog\\\/iot-internet-of-things-vs-internet-of-threats#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/08\\\/iot-internet-of-things-vs-internet-of-threats\\\/\"},\"author\":{\"name\":\"version2hk\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\"},\"headline\":\"IOT: INTERNET OF THINGS VS. INTERNET OF THREATS\",\"datePublished\":\"2022-08-10T06:20:45+00:00\",\"dateModified\":\"2022-08-18T02:43:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/08\\\/iot-internet-of-things-vs-internet-of-threats\\\/\"},\"wordCount\":1034,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nordsecurity.com\\\/blog\\\/iot-internet-of-things-vs-internet-of-threats#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/res.cloudinary.com\\\/nordsec\\\/f_auto,c_limit,w_3840,q_auto\\\/v1\\\/nord-security-web\\\/blog\\\/categories\\\/cybersecurity\\\/2022\\\/05\\\/Blog_image_size_1280x720.png\",\"keywords\":[\"2022\",\"Nord Security\"],\"articleSection\":[\"Nord Security\",\"2022\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/08\\\/iot-internet-of-things-vs-internet-of-threats\\\/\",\"url\":\"https:\\\/\\\/nordsecurity.com\\\/blog\\\/iot-internet-of-things-vs-internet-of-threats\",\"name\":\"IOT: INTERNET OF THINGS VS. INTERNET OF THREATS - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nordsecurity.com\\\/blog\\\/iot-internet-of-things-vs-internet-of-threats#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nordsecurity.com\\\/blog\\\/iot-internet-of-things-vs-internet-of-threats#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/res.cloudinary.com\\\/nordsec\\\/f_auto,c_limit,w_3840,q_auto\\\/v1\\\/nord-security-web\\\/blog\\\/categories\\\/cybersecurity\\\/2022\\\/05\\\/Blog_image_size_1280x720.png\",\"datePublished\":\"2022-08-10T06:20:45+00:00\",\"dateModified\":\"2022-08-18T02:43:11+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nordsecurity.com\\\/blog\\\/iot-internet-of-things-vs-internet-of-threats#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nordsecurity.com\\\/blog\\\/iot-internet-of-things-vs-internet-of-threats\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/nordsecurity.com\\\/blog\\\/iot-internet-of-things-vs-internet-of-threats#primaryimage\",\"url\":\"https:\\\/\\\/res.cloudinary.com\\\/nordsec\\\/f_auto,c_limit,w_3840,q_auto\\\/v1\\\/nord-security-web\\\/blog\\\/categories\\\/cybersecurity\\\/2022\\\/05\\\/Blog_image_size_1280x720.png\",\"contentUrl\":\"https:\\\/\\\/res.cloudinary.com\\\/nordsec\\\/f_auto,c_limit,w_3840,q_auto\\\/v1\\\/nord-security-web\\\/blog\\\/categories\\\/cybersecurity\\\/2022\\\/05\\\/Blog_image_size_1280x720.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nordsecurity.com\\\/blog\\\/iot-internet-of-things-vs-internet-of-threats#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IOT: INTERNET OF THINGS VS. INTERNET OF THREATS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\",\"name\":\"version2hk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"caption\":\"version2hk\"},\"sameAs\":[\"http:\\\/\\\/version2xfortcom.wordpress.com\"],\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/version2hk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IOT: INTERNET OF THINGS VS. INTERNET OF THREATS - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nordsecurity.com\/blog\/iot-internet-of-things-vs-internet-of-threats","og_locale":"en_US","og_type":"article","og_title":"IOT: INTERNET OF THINGS VS. INTERNET OF THREATS - Version 2","og_description":"Internet of Things (IoT) is a rapidly growing industry. [&hellip;]","og_url":"https:\/\/nordsecurity.com\/blog\/iot-internet-of-things-vs-internet-of-threats","og_site_name":"Version 2","article_published_time":"2022-08-10T06:20:45+00:00","article_modified_time":"2022-08-18T02:43:11+00:00","og_image":[{"url":"https:\/\/res.cloudinary.com\/nordsec\/f_auto,c_limit,w_3840,q_auto\/v1\/nord-security-web\/blog\/categories\/cybersecurity\/2022\/05\/Blog_image_size_1280x720.png","type":"","width":"","height":""}],"author":"version2hk","twitter_card":"summary_large_image","twitter_misc":{"Written by":"version2hk","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nordsecurity.com\/blog\/iot-internet-of-things-vs-internet-of-threats#article","isPartOf":{"@id":"https:\/\/version-2.com\/2022\/08\/iot-internet-of-things-vs-internet-of-threats\/"},"author":{"name":"version2hk","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db"},"headline":"IOT: INTERNET OF THINGS VS. INTERNET OF THREATS","datePublished":"2022-08-10T06:20:45+00:00","dateModified":"2022-08-18T02:43:11+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2022\/08\/iot-internet-of-things-vs-internet-of-threats\/"},"wordCount":1034,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/nordsecurity.com\/blog\/iot-internet-of-things-vs-internet-of-threats#primaryimage"},"thumbnailUrl":"https:\/\/res.cloudinary.com\/nordsec\/f_auto,c_limit,w_3840,q_auto\/v1\/nord-security-web\/blog\/categories\/cybersecurity\/2022\/05\/Blog_image_size_1280x720.png","keywords":["2022","Nord Security"],"articleSection":["Nord Security","2022","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2022\/08\/iot-internet-of-things-vs-internet-of-threats\/","url":"https:\/\/nordsecurity.com\/blog\/iot-internet-of-things-vs-internet-of-threats","name":"IOT: INTERNET OF THINGS VS. INTERNET OF THREATS - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nordsecurity.com\/blog\/iot-internet-of-things-vs-internet-of-threats#primaryimage"},"image":{"@id":"https:\/\/nordsecurity.com\/blog\/iot-internet-of-things-vs-internet-of-threats#primaryimage"},"thumbnailUrl":"https:\/\/res.cloudinary.com\/nordsec\/f_auto,c_limit,w_3840,q_auto\/v1\/nord-security-web\/blog\/categories\/cybersecurity\/2022\/05\/Blog_image_size_1280x720.png","datePublished":"2022-08-10T06:20:45+00:00","dateModified":"2022-08-18T02:43:11+00:00","breadcrumb":{"@id":"https:\/\/nordsecurity.com\/blog\/iot-internet-of-things-vs-internet-of-threats#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nordsecurity.com\/blog\/iot-internet-of-things-vs-internet-of-threats"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nordsecurity.com\/blog\/iot-internet-of-things-vs-internet-of-threats#primaryimage","url":"https:\/\/res.cloudinary.com\/nordsec\/f_auto,c_limit,w_3840,q_auto\/v1\/nord-security-web\/blog\/categories\/cybersecurity\/2022\/05\/Blog_image_size_1280x720.png","contentUrl":"https:\/\/res.cloudinary.com\/nordsec\/f_auto,c_limit,w_3840,q_auto\/v1\/nord-security-web\/blog\/categories\/cybersecurity\/2022\/05\/Blog_image_size_1280x720.png"},{"@type":"BreadcrumbList","@id":"https:\/\/nordsecurity.com\/blog\/iot-internet-of-things-vs-internet-of-threats#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"IOT: INTERNET OF THINGS VS. INTERNET OF THREATS"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db","name":"version2hk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","caption":"version2hk"},"sameAs":["http:\/\/version2xfortcom.wordpress.com"],"url":"https:\/\/version-2.com\/en\/author\/version2hk\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-ecj","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/54579","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/143524195"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=54579"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/54579\/revisions"}],"predecessor-version":[{"id":54583,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/54579\/revisions\/54583"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=54579"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=54579"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=54579"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}