Please fill in the form below to subscribe to our blog

Is Biden’s Peloton Bike an IoT Cybersecurity Risk?

January 25, 2021
IoT cybersecurity risk

Is Every Connected Device in a Staffer’s Home an IoT Cybersecurity Risk?


Most folks are still working from home at least some of the time. That creates a number of challenges for IT departments around cybersecurity and smart devices. As our lives become ever more connected to the internet through everything from smartphones to smart bikes, it’s important to remember that even the most humble internet-connected device can be a security risk. Many business IT teams are still coming to terms with that increased Internet-of-Things (IoT) cybersecurity risk and how to mitigate it.


IoT Devices (and Risks) Are Proliferating


During the last year, as we all spent more time at home, many folks discovered that they could make their home lives a little more pleasant with IoT devices. Experts estimate that more than 26.66 billion IoT devices are active in 2020, with 127 new IoT devices connecting to the internet every second. However, researchers also report that IoT devices face 5,200 attacks a month. That means that organizations need to keep IoT security top of mind as their security posture evolves.

Including the White House. The original work from home example, the President’s House is also home to one of the world’s most secure and sensitive networks. As new First Families with an increasing number of IoT devices move in, like President Biden and his Peloton bike, the White House cybersecurity team is faced with the same dilemma as many businesses: how to secure their IT environment against the potential risk.



 IoT Cybersecurity risk can impact your cyber resilience

Don’t let cyberattacks put the brakes on your business. Stay agile and keep your engine running under any conditions. Start your journey on The Road to Cyber Resilience now! DOWNLOAD THIS PACKAGE>>


How to Mitigate the Risk


In the case of the President’s bike, the Secret Service and the National Security Agency (NSA) will make changes to both the physical structure and the IT capability as well as enacting strong access control policies and tools in order to mitigate the risk. Cameras and microphones will be removed, and a constant series of password changes will help blunt the possibility of foreign agents hacking into President Biden’s Peloton. This tracks with the advice given by the National Institute of Standards and Technology (NIST).

But most companies don’t need to go that far when securing their environments against IoT risks. Businesses can keep their networks safe and employees can enjoy their IoT devices without taking drastic measures or spending a fortune. While cybercrime risks continue to climb across the board, by taking sensible precautions, organizations can secure their systems and data from many of the pitfalls that arise from remote working IoT cybersecurity risks quickly and affordably.



Add a Universal Mitigation Now


One key to mitigating IoT risk and remaining cyber resilient as an organization is maintaining strong access point control. It’s not just a fantastic mitigation for IoT risk either. Strong access point control is essential for mitigating all types of cybersecurity risk – and secure identity and access management with a solution like Passly is an effective, cost-effective way to implement it in a flash.

Passly brings major weapons against intrusion to the fight with multifactor authentication (MFA), single sign-on (SSO), and secure shared password vaults. MFA is a must-have in today’s rapidly evolving threat landscape – it has been proven to block up to 99.9% of common cyberattacks from getting through to business systems. Back that up with single sign-on that empowers your IT team to add and remove permissions fast in case of compromise and secure shared password vaults to make sure that your team can easily respond to emergencies remotely, and you’ve added a huge amount of security strength for a small price.

Contact ID Agent’s experts today to add Passly to your security stack or watch a video of Passly in action to see why it’s perfect for every business.