Loading...

12 tips to safeguard the Internet of Things

Published: May 18, 2016 by Adam Fingersh

Iot4-shutterstock_329519927
The benefits of the Internet of Things are only as strong as the weakest connected point.

Having fraud prevention strategies in place that businesses and consumers can use to manage risk and increase security when using Internet-enabled products, also known as the Internet of Things (IoT), is critical.

In addition to connected devices such as smartphones and tablets, a tremendous number of consumer products — including cars, heart monitors and household appliances — are now connected to the Internet. Many of these connected products have weak security and controls, creating points of weakness in users’ critical private networks, systems, and data.

The Internet of Things is only as strong as its weakest link, and it is important to fully understand what an interconnected environment means. Opening products and services to the Internet dramatically increases the opportunities for cyber criminals, who can hack those products to get into your broader systems.

As more and more products are connected, a casual mindset about the security risks inherent in IoT can create significant risk. Knowing that, we are sharing the following tips for both consumers and businesses.

Consumers
To help consumers protect themselves against the risks and vulnerabilities regarding the Internet of Things, Experian’s global Fraud and Identity business has developed the following tips:

  • Ensure that the products and services being purchased and connected are from reputable companies.
  • Ensure that the providers of these products and services have clear privacy and data-usage policies.
  • Be aware that data from any smart device may make its way to third parties for a variety of purposes and that there are not always standard policies across providers.
  • Make sure that any access to these systems is always closely guarded.
  • Be aware of the applications installed on devices and download applications only from reputable providers, such as the iTunes App Store or Google Play, rather than gray-market app platforms. Also, only download apps created by trusted entities.

In addition to consumers enjoying the benefits of online access to multiple devices, businesses also need to be accountable. Thoughtfully applying appropriate levels of holistic thinking will go a long way toward ensuring that your business’s contribution isn’t the weakest link and that the Internet of Things continues its rapid and exciting growth.

Businesses
Experian encourages businesses to work with the mindset that any product poses a significant potential for threat. The tips below were created for businesses to use as a guideline:

  • Access to systems should require more than just credentials. Leverage cyber intelligence and complex device-recognition solutions to prevent unauthorized access.
  • Designate who has access to systems and clarify why they need it. It is also important to understand the normal behavior of who is logging into these systems, so that when anomalies occur, immediate preventative action can be taken.
  • Clearly outline roles and responsibilities in terms of access monitoring. This can be segmented by factors such as channel or line of business.
  • Share intelligence across the consumer and enterprise side of your business.
  • Partner with providers that have been successfully solving the account takeover problem. The concerns and vulnerabilities of Account Takeover problems in the digital realm using fit-for-purpose technologies are similar to the concerns and vulnerabilities in the Internet of Things world.
  • Apply robust privacy policies and practices. Doing so will ensure that the data being collected is actually required for the services offered and that data-collection practices are easily understood by the consumer.
  • Treat any collected data as highly sensitive information. It is important to note that even seemingly uninteresting data can be used by fraudsters to build robust and accurate stolen identities, which can be used for online impersonation, social engineering, phishing attacks and more.

Learn more about Experian’s Fraud and Identity business.

Related Posts

Financial institutions can help protect clients by educating them on the warning signs of fraudulent lottery scams.

Published: March 12, 2025 by Alex Lvoff

Fraud rings cause an estimated $5 trillion in financial damages every year, making them one of the most dangerous threats facing today’s businesses. They’re organized, sophisticated and only growing more powerful with the advent of Generative AI (GenAI). Armed with advanced tools and an array of tried-and-true attack strategies, fraud rings have perfected the art of flying under the radar and circumventing traditional fraud detection tools. Their ability to adapt and innovate means they can identify and exploit vulnerabilities in businesses' fraud stacks; if you don’t know how fraud rings work and the right signs to look for, you may not be able to catch a fraud ring attack until it’s too late. What is a fraud ring? A fraud ring is an organized group of cybercriminals who collaborate to execute large-scale, coordinated attacks on one or more targets. These highly sophisticated groups leverage advanced techniques and technologies to breach fraud defenses and exploit vulnerabilities. In the past, they were primarily humans working scripts at scale; but with GenAI they’re increasingly mobilizing highly sophisticated bots as part of (or the entirety of) the attack. Fraud ring attacks are rarely isolated incidents. Typically, these groups will target the same victim multiple times, leveraging insights gained from previous attack attempts to refine and enhance their strategies. This iterative approach enables them to adapt to new controls and increase their impact with each subsequent attack. The impacts of fraud ring attacks far exceed those of an individual fraudster, incurring significant financial losses, interrupting operations and compromising sensitive data. Understanding the keys to spotting fraud rings is crucial for crafting effective defenses to stop them. Uncovering fraud rings There’s no single tell-tale sign of a fraud ring. These groups are too agile and adaptive to be defined by one trait. However, all fraud rings — whether it be an identity fraud ring, coordinated scam effort, or large-scale ATO fraud scheme — share common traits that produce warning signs of imminent attacks. First and foremost, fraud rings are focused on efficiency. They work quickly, aiming to cause as much damage as possible. If the fraud ring’s goal is to open fraudulent accounts, you won’t see a fraud ring member taking their time to input stolen data on an application; instead, they’ll likely copy and paste data from a spreadsheet or rely on fraud bots to execute the task. Typically, the larger the fraud ring attack, the more complex it is. The biggest fraud rings leverage a variety of tools and strategies to keep fraud teams on their heels and bypass traditional fraud defenses. Fraud rings often test strategies before launching a full-scale attack. This can look like a small “probe” preceding a larger attack, or a mass drop-off after fraudsters have gathered the information they needed from their testing phase. Fraud ring detection with behavioral analytics Behavioral analytics in fraud detection uncovers third-party fraud, from large-scale fraud ring operations and sophisticated bot attacks to individualized scams. By analyzing user behavior, organizations can effectively detect and mitigate these threats. With behavioral analytics, businesses have a new layer of fraud ring detection that doesn’t exist elsewhere in their fraud stack. At a crowd level, behavioral analytics reveals spikes in risky behavior, including fraud ring testing probes, that may indicate a forthcoming fraud ring attack, but would typically be hidden by sheer volume or disregarded as normal traffic. Behavioral analytics also identifies the high-efficiency techniques that fraud rings use, including copy/paste or “chunking” behaviors, or the use of advanced fraud bots designed to mimic human behavior. Learn more about our behavioral analytics solutions and their fraud ring detection capabilities. Learn more

Published: February 27, 2025 by Presten Swenson

Fraud never sleeps, and neither do the experts working to stop it. That’s why we’re thrilled to introduce Meet the Maker, our new video series spotlighting the brilliant minds behind Experian’s cutting-edge fraud solutions. In our first episode, Matt Ehrlich, Senior Director of Identity and Fraud Product Management, and Andrea Nighswander, Senior Director of Global Solution Strategy, share how they use data, advanced analytics, and deep industry expertise to stay ahead of fraudsters. With 35+ years of combined experience, these fraud-fighting veterans know exactly what it takes to keep bad actors at bay. Watch now for an exclusive look at the minds shaping the future of fraud prevention.    Stay tuned for more episodes featuring the visionaries driving fraud innovation.

Published: February 21, 2025 by Julie Lee