Comment On IoT Risks Of Peloton Bike

Following the recent debate of security concerns around IoT devices such as President Bidens Peloton bike, cybersecurity experts have provided the following comments:

Experts Comments

January 21, 2021
Joseph Carson
Chief Security Scientist & Advisory CISO
Thycotic

Attackers will use the path to least resistance when trying to access networks and many IoT devices provide this. The most secure IoT device, such as a piece of home equipment in Biden’s case, is one that is completely powered fully off when it is not being used. Security risks only get introduced when you turn it on and use it.

January 21, 2021
Matt Lock
Technical Director
Varonis

The Peloton phenomenon has reached far and wide and whilst exercise equipment may seem pretty innocuous, any connected device can potentially present a cybersecurity risk. Lax controls around gadgets like connected speakers or games consoles could be the shortcut to laptops, or phones with far more sensitive information.  

 

And whilst the cybersecurity stakes posed here are inordinately higher than for the average home user, hacks via smart devices aren’t just a risk for the president.

.....Read More

The Peloton phenomenon has reached far and wide and whilst exercise equipment may seem pretty innocuous, any connected device can potentially present a cybersecurity risk. Lax controls around gadgets like connected speakers or games consoles could be the shortcut to laptops, or phones with far more sensitive information.  

 

And whilst the cybersecurity stakes posed here are inordinately higher than for the average home user, hacks via smart devices aren’t just a risk for the president. Everyone should take some basic precautions: check settings, change default passwords and disable features you’re not using. No doubt this is one area in which extra vetting will be needed so that the president can exercise without his team sweating over the security risks.

  Read Less

Submit Your Expert Comments

What do you think of the topic? Do you agree with expert(s) or share your expert opinion below.
Be part of our growing Information Security Expert Community (1000+), please register here.

Write Your Expert Comments *
Your Registered Email *
Notification Email (If different from your registered email)
* By using this form you agree with the storage and handling of your data by this web site.