Smart Cities, A Gold Mine of Data – How Can Organisations Protect Themselves?

The National Cyber Security Centre warned that smart cities will be the next major target for cybercriminals. This comes after a year of booming cybercrime, with a nearly 600% rise in malicious attacks worldwide. How, then, can we protect against this rising threat?

Experts Comments

May 10, 2021
Jake Moore
Cybersecurity Specialist
ESET

The more connected devices, the more threat vectors become open for cybercriminals to exploit. When creating smart cities it is vital that those designing them have security in mind from the outset and attempt to future-proof the infrastructures. Failure to prepare for cyberattacks now will mean they will inevitably fall over later and with the amount of data at risk, smart cities could be a disaster. More devices mean more of our private information is at stake which will remain a target to

.....Read More

The more connected devices, the more threat vectors become open for cybercriminals to exploit. When creating smart cities it is vital that those designing them have security in mind from the outset and attempt to future-proof the infrastructures. Failure to prepare for cyberattacks now will mean they will inevitably fall over later and with the amount of data at risk, smart cities could be a disaster. More devices mean more of our private information is at stake which will remain a target to those who want to take advantage of such new technologies, so we need to be mindful of how much of our personal data we release.

  Read Less
May 10, 2021
Andy Norton
European Cyber Risk Officer
Armis

Smart devices turning rogue will be one of the critical challenges facing smart cities and other digitally transformed aspects in society. There is a real physical cyber threat posed by the unauthorised commandeering or corruption of a smart device that is a component of critical infrastructure.

 

The loss of sensitive data from eavesdropping devices has also been recognised in other areas of UK society. Currently, the new Telecom Security Requirements  (TSR) is imposing a ban on High Risk

.....Read More

Smart devices turning rogue will be one of the critical challenges facing smart cities and other digitally transformed aspects in society. There is a real physical cyber threat posed by the unauthorised commandeering or corruption of a smart device that is a component of critical infrastructure.

 

The loss of sensitive data from eavesdropping devices has also been recognised in other areas of UK society. Currently, the new Telecom Security Requirements  (TSR) is imposing a ban on High Risk Vendors, notably Huawei. How many devices do we use in our everyday life that have a license agreement which states: 'you bear all the risks, opposing the basic principles determined in the constitution of the Peoples Republic of China?'  

 

Recognition of this “sleeper” device integrity risk was the catalyst of the US FAR-889 regulation preventing the sale of certain Chinese devices to US government and banning the usage of such equipment by contractors to the US government. The UK TSR, though, is far more far reaching than just High Risk Vendors, and will force Telcos to implement and demonstrate compliance with a broader cyber resilience framework based on the NCSC CAF3.0.

  Read Less
May 10, 2021
Tom Van de Wiele
Principal Consultant
F-Secure

Smart cities make life more efficient and have been around for a while, but they do invite privacy and security risks. Ultimately, there is a real risk for harm from unsecured networks that share data from sensors and analysis tools. The high degree of connectivity in these technologies means that an attacker could, potentially, take malicious action across the entire UK with ease if proper security measures such as segregation of networks and fallback processes are not

.....Read More

Smart cities make life more efficient and have been around for a while, but they do invite privacy and security risks. Ultimately, there is a real risk for harm from unsecured networks that share data from sensors and analysis tools. The high degree of connectivity in these technologies means that an attacker could, potentially, take malicious action across the entire UK with ease if proper security measures such as segregation of networks and fallback processes are not enforced and properly tested.

 

A nation state, a serious organised crime group, or attackers wishing to harm critical, national infrastructure without direct loss of life could create countless amounts of chaos. Threat actors on the prowl looking to abuse smart city networks and its decision-making patterns really are viable threats and isn’t far off from what we saw happen at the Florida water plant hack in February. The possibilities for attack are relatively endless.   

 

Striking the right balance between efficiency, privacy and security is important so it’s no surprise the NCSC are setting out guidelines to get a hold over some of the risks

  Read Less
May 10, 2021
Adam Enterkin
SVP, EMEA
BlackBerry

If it can be hacked, it will be. As the IoT booms to 67 billion new connected devices by 2025, the nation’s critical infrastructure is increasingly reliant on networks of these devices. During this pandemic, we have seen a nearly 600% rise in malicious attacks worldwide targeting schools and universities, offices, government departments, and hospitals. As potential doorways to lucrative data, medical records, and government secrets, every IoT endpoint must be secured to ensure hackers can’t

.....Read More

If it can be hacked, it will be. As the IoT booms to 67 billion new connected devices by 2025, the nation’s critical infrastructure is increasingly reliant on networks of these devices. During this pandemic, we have seen a nearly 600% rise in malicious attacks worldwide targeting schools and universities, offices, government departments, and hospitals. As potential doorways to lucrative data, medical records, and government secrets, every IoT endpoint must be secured to ensure hackers can’t hijack public systems, steal data and wreak havoc.

 

Smart cities will soon become a significant branch of this increasingly connected IoT system, where complexity often leads to vulnerability. The average new car, for instance, contains more than 100 million lines of code and some of the most complex software ever deployed by automakers. Now making their way onto Britain’s roads, each one poses a threat to public safety if not properly secured. As a society, we must not be overwhelmed by the magnitude of the task to secure each and every device; our collective safety depends on it. 

 

Before deploying any powerful technology or artificial intelligence, we must learn to anticipate the threat, recognise the value of IoT systems to cyber attackers, and prepare to respond to any sign of unauthorised hackers. Cybercriminals are waiting for organisations and the public to drop their guard. We must not let them seize the opportunity.

  Read Less
May 10, 2021
Stephen Bradford
SVP EMEA
SailPoint

Smart cities are useful to help improve efficiencies for urban infrastructure but the data that resides in this technology- often commercially sensitive and personal- is a gold mine for criminal and hostile states. 

 

Supplier or not, anyone working within these critical projects has the potential to be a threat and pass sensitive information into the wrong hands if the right cybersecurity measures aren’t in place. Organisations must therefore secure access at all costs, only giving

.....Read More

Smart cities are useful to help improve efficiencies for urban infrastructure but the data that resides in this technology- often commercially sensitive and personal- is a gold mine for criminal and hostile states. 

 

Supplier or not, anyone working within these critical projects has the potential to be a threat and pass sensitive information into the wrong hands if the right cybersecurity measures aren’t in place. Organisations must therefore secure access at all costs, only giving stakeholders as much access as is required to perform their assigned roles and responsibilities – no more, no less. This is vital to spot unusual, suspicious behaviour and to root out threats well before a breach occurs.

  Read Less
What do you think of the topic? Do you agree with expert(s) or share your expert opinion below.
Be part of our growing Information Security Expert Community (1000+), please register here.