Block on Trump's Asylum Ban Upheld by Supreme Court
While smart tech may be everywhere these days, people, and especially lawyers, should be smart and look before they leap, so to speak, when using smart gadgets from mini to massive.
Just recently Tech Crunch reported on a set of tiny smart speakers designed for outdoor sports enthusiasts that were found to be seriously lacking in terms of smart security. But it's not just smart toys that can have devastating security holes, whole smart buildings can be left wide open to cyber-attacks if security isn't made a top priority prior to implantation.
Patching Your Cyber Holes
As the smart speakers demonstrate, oftentimes smart tech may offer some novel features at an unbeatable price (and sometimes at an exorbitant price), but may never have been put through the rigorous security testing that is required to prevent hackers from targeting the device in mass. The speakers in question worked in conjunction with an app that left open a door on the web that hackers could use to obtain all sorts of personal information, from contact lists to usernames and even passwords.
However, that's just skimming the surface. Whole Building Automation Systems can be left wide open for a range of reasons, from a bad deployment of a certain piece of smart tech, to a IT or cybersecurity contractor setting up a remote access point to provide 24/7 support.
Siegeware Is a Thing
You should already be familiar with ransomware, where hackers lock down a person or company's computer systems in exchange for a money ransom. And now, with how far building automation and smart-home tech has come, hackers have taken the next logical step and started targeting buildings that can be entirely controlled remotely.
At first blush, this might seem like some small potatoes hacking, but for hospital administrators, or other large building owners, the potential exposure and liabilities are very real.