{"id":12340,"date":"2017-07-20T09:35:37","date_gmt":"2017-07-20T14:35:37","guid":{"rendered":"https:\/\/www.firewalls.com\/blog\/?p=12340"},"modified":"2025-10-23T10:56:19","modified_gmt":"2025-10-23T15:56:19","slug":"secrets-internet-of-things","status":"publish","type":"post","link":"https:\/\/www.firewalls.com\/blog\/secrets-internet-of-things\/","title":{"rendered":"Secrets of the Mysterious &#038; Ubiquitous Internet of Things"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"12340\" class=\"elementor elementor-12340\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-605a3bc6 e-flex e-con-boxed e-con e-parent\" data-id=\"605a3bc6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1176ebaa elementor-widget elementor-widget-text-editor\" data-id=\"1176ebaa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Without peeking, tell me the number of Internet-connected devices in the room with you. How about in the whole building? In 2017, it&#8217;s likely that the building itself is connected to the Internet. Whether it be through mobile-controlled thermostats, security cameras, or the traffic lights right outside your window. You live in a reality in which an Internet-capable device is likely within a few steps of you at any given time.<\/p><p>This is the Internet of Things. The term was coined by\u00a0<span style=\"font-size: 18.4px;\">Kevin Ashton of MIT\u2019s Auto-ID Center in 1999.\u00a0<\/span><span style=\"font-size: 1.15rem;\">While the name doesn&#8217;t seem all that inspired, it describes a nebulous world of Wi-Fi, RFID, and microcode. that affects just about every transaction and interaction throughout your day. As years pass, the Internet of Things grows. When an app is launched allowing you to refill your dog\u2019s food bowl while you\u2019re at the office, the Internet of Things grows. When cutting-edge garden tech allows you to water your herbs from halfway around the globe, the Internet of Things grows.<\/span><\/p><h3><strong>What is the Internet of Things?<\/strong><\/h3><p>The Internet of Things is an umbrella term describing the vast array of Internet-accessing devices that we interact with on a daily basis. This includes mobile devices, vehicles, thermostats, home appliances, street cameras, air purifiers, and much more. Objects that possess sensors, software, or microchips and likely to fall under the IoT umbrella. The concept is hard to wrap your head around because it reaches across every industry and every channel one could imagine.<\/p><p>The great fear in the cyber security world in regard to the IoT. It creates a potential for hackers to remotely access and control devices over networks shared by the IoT.<\/p><h3><strong>Welcome Aboard: An IoT Metaphor<\/strong><\/h3><p>Let\u2019s picture the Internet of Things as a cruise liner. The klaxons sound in response to an engine room breach&#8211;in the case of the IoT, a hacker; in the case of our cruise liner, a hole in the haul\u2014and seamen begin to combat the leak.\u00a0<span style=\"font-size: 1.15rem;\">Water-tight hatches are sealed between various compartments of the ship. It ensures that water coming in through the engine room is unable to spread into neighboring compartments.\u00a0<\/span><\/p><p><span style=\"font-size: 1.15rem;\">In our IoT analogy, there\u2019s an open pipe running from the engine room to the officers\u2019 quarters because the sailors requested soda fountains.\u00a0<\/span><span style=\"font-size: 1.15rem;\">Another pipe runs from the engine room to the storage compartments because water is needed to humidify the air. Another pipe runs between the engine room and the ballast compartments for regulating buoyancy. Even though the maintenance team has sealed off all the main hatches between compartments, the leak continues to spread. The innumerable channels it spreads to are made possible by the demands of the crew.<\/span><\/p><h3><strong>Issues of IoT Vulnerability in the Real World<\/strong><\/h3><ul><li><strong>Devil\u2019s Ivy<\/strong> \u2013 On July 18<sup>th<\/sup>, 2017, Senrio released an in-depth write-up of an IoT zero-day exploit dubbed \u201cDevil\u2019s Ivy.\u201d The threat was discovered in an Axis Communications M3004 security camera. The exploit was made possible thanks to an open-source toolkit called gSOAP. This boasts over one million downloads and counts IBM, Microsoft, Adobe, and Xerox among their customer bases. Senrio claims \u201cIt is likely that tens of millions of products\u2014software products and connected devices\u2014are affect by Devil\u2019s Ivy to some degree.\u201d But don\u2019t take our word for it, check out the video published by Senrio Labs below.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1eeee0c elementor-widget__width-initial elementor-widget elementor-widget-video\" data-id=\"1eeee0c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;video_type&quot;:&quot;vimeo&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<iframe class=\"elementor-video-iframe lazyload\" allowfullscreen allow=\"clipboard-write\" title=\"vimeo Video Player\" data-src=\"https:\/\/player.vimeo.com\/video\/225922694?color&amp;autopause=0&amp;loop=0&amp;muted=0&amp;title=1&amp;portrait=1&amp;byline=1#t=\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" data-load-mode=\"1\"><\/iframe>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-37e04a4 elementor-widget elementor-widget-text-editor\" data-id=\"37e04a4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4><strong>FBI Announcement for IoT Toys<\/strong><\/h4>\n<p>On Monday, the FBI issued a consumer notice to parents warning them of the threats associated with Internet-connected toys. As interactive toys grow in popularity, toys are being made with sensors, microchips, data storage, cameras, and more. The FBI warns that these types of toys may be used to compromise the privacy of children. The Public Service Announcement can be <a href=\"https:\/\/www.ic3.gov\/media\/2017\/170717.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">found here<\/a>.<\/p>\n<div>&nbsp;<\/div>\n<h4><strong>IoT Security is Expensive<\/strong><\/h4>\n<p>The costs associated with IoT security are rapidly growing to keep pace with the sheer size of the Internet of Things. According to Altman Vilandrie &amp; Co., the IoT is projected to encompass 18,000,000,000 devices by 2022. That&#8217;s more than double the number of human beings on the planet. Altman Vilandrie also estimated that spending on IoT security will outgrow spending on \u201ctraditional\u201d cyber security at a rate of nearly 2.5 times.<\/p>\n<div>&nbsp;<\/div>\n<h4><strong>Passenger Drones Over Dubai<\/strong><\/h4>\n<p>&amp; the award for \u201cMost Terrifying Place to Learn About IoT Breaches\u201d goes to\u2026 the inside of a passenger drone. The drone that is hovering hundreds of feet above the ground. Dubai has announced its intention to implement passenger-carrying quadcopters. These luxurious taxis will go live in the summer of 2018. Passengers will have no manual controls, relying instead on Internet-connected GPS to deliver them at their destination.&nbsp;<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2b89349 elementor-widget__width-initial elementor-widget elementor-widget-video\" data-id=\"2b89349\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/youtu.be\\\/ngCJ2NMirH0&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-feae98b elementor-widget elementor-widget-text-editor\" data-id=\"feae98b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><strong>Optimizing Security for the IoT<\/strong><\/h3><h4><strong>Disable UPnP<\/strong><\/h4><p>Many firewalls and routers possess a feature known as Universal Plug and Play (UPnP). This setting allows a device to plug into a network and configure itself, making it more convenient and mobile. However, this extra versatility comes at a price. Security experts believe that UPnP may allow exploits to automatically jump from the IoT to the network during configuration. Once your appliance is positioned, it is a great idea to disable UPnP.<\/p><p><a href=\"https:\/\/nakedsecurity.sophos.com\/2013\/02\/05\/upnp-flaws-turn-millions-of-firewalls-into-doorstops\/\" target=\"_blank\" rel=\"noopener noreferrer\">Learn more about UPnP<\/a> from our friends at Sophos.<\/p><p>\u00a0<\/p><h4><strong>Strengthen Your Passwords<\/strong><\/h4><p>Yes, this is the same advice we give to those seeking to optimize their more traditional cyber security. However, the IoT carries with it further complications in this arena. In many cases when one wants to set a password, they are presented with a numpad and asked to enter a 4-digit PIN. This can make it difficult to secure your devices with strong enough passwords.<\/p><p>We suggest that you create a unique password for each device. Yes, it will mean that you have a lot more passwords to keep track of, but it does protect your data in case of a breach.<\/p><p>\u00a0<\/p><h4><strong>Patch Your Firmware<\/strong><\/h4><p>Wow, I think we\u2019ve <a href=\"https:\/\/www.firewalls.com\/blog\/ransomware-warfare-how-to-protect-your-files-from-hostage-takers\/\" target=\"_blank\" rel=\"noopener noreferrer\">heard this one before<\/a> too! Again, we cannot stress enough the importance of keeping your security patches and firmware up to date. If you dissect most major cyber attacks, you will discover that the affected demographics tends to gravitate around those who ignore the latest updates. In the IoT world, firmware may also sometimes be referred to as \u201cmicrocode.\u201d<\/p><p>\u00a0<\/p><h4><strong>Segregate IoT Devices to Your Guest Network<\/strong><\/h4><p>Many businesses now provide guest networks that remain overtly separate from their private network. Doing so provides the peace of mind that some schmuck on the street isn\u2019t going to connect to your wireless network and spread bugs around your system. If possible, try to quarantine as many IoT devices onto this guest network as possible. This way if a breach does occur, your most precious data is sheltered.<\/p><div>\u00a0<\/div><h3>Wrapping Up<\/h3><p>The cyber security industry absolutely buzzes with excitement, anxiety, and doubt when the discussion turns to the Internet of Things. It is an explosive matter. The IoT will continue to grow. Its ability to make our lives more convenient and connected will continue to grow. So too will the threats and vulnerabilities that it represents.\u00a0<\/p><p>Expect to see high-profile news stories revolving around Internet-connected objects and expect to see your budget in this area balloon as the IoT expands. From cars to toys to cameras, every industry and interest contributes to the ever-expanding galaxy that is the Internet of Things.<\/p><p>\u00a0<\/p><h3>How Can Firewalls.com Help?<\/h3><p><em>Firewalls.com is a value-added reseller of firewall appliances &amp; a vendor of <a href=\"https:\/\/www.firewalls.com\/professional-services.html\" target=\"_blank\" rel=\"noopener noreferrer\">managed security and Firewall-as-a-Service support<\/a>. Our engineers are rigorously trained and certified by all of the major manufacturers that we partner with. Whether you&#8217;re looking to add an appliance to your security set-up or seek ongoing support from seasoned experts, we can provide the security solutions necessary to get you secure and keep you secure. <\/em><\/p><p>Contact one of our knowledgeable\u00a0sales staff to answer any questions you may have about your network, our firewalls, or the Internet of Things!<\/p><p>You can also follow us on <a href=\"https:\/\/twitter.com\/firewallscom\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a> and <a href=\"https:\/\/www.facebook.com\/Firewallscom\/\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The Internet of Things (IoT) is constantly growing. By 2018, there will be more IoT devices on the planet than humans to operate them.<\/p>\n","protected":false},"author":5,"featured_media":12360,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[286],"tags":[],"class_list":["post-12340","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Secrets of the Mysterious &amp; Ubiquitous Internet of Things - Firewalls.com<\/title>\n<meta name=\"description\" content=\"The Internet of Things (IoT) is constantly growing. By 2018, there will be more IoT devices on the planet than humans to operate them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.firewalls.com\/blog\/secrets-internet-of-things\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Secrets of the Mysterious &amp; Ubiquitous Internet of Things - Firewalls.com\" \/>\n<meta property=\"og:description\" content=\"The Internet of Things (IoT) is constantly growing. By 2018, there will be more IoT devices on the planet than humans to operate them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.firewalls.com\/blog\/secrets-internet-of-things\/\" \/>\n<meta property=\"og:site_name\" content=\"Firewalls.com\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/firewallscom\" \/>\n<meta property=\"article:published_time\" content=\"2017-07-20T14:35:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-23T15:56:19+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/07\/featuredimageiot.png\" \/>\n\t<meta property=\"og:image:width\" content=\"780\" \/>\n\t<meta property=\"og:image:height\" content=\"330\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Andrew Harmon\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@firewallscom\" \/>\n<meta name=\"twitter:site\" content=\"@firewallscom\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Andrew Harmon\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/secrets-internet-of-things\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/secrets-internet-of-things\\\/\"},\"author\":{\"name\":\"Andrew Harmon\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#\\\/schema\\\/person\\\/8e89a2f96065af1717d00dfd06dca962\"},\"headline\":\"Secrets of the Mysterious &#038; Ubiquitous Internet of Things\",\"datePublished\":\"2017-07-20T14:35:37+00:00\",\"dateModified\":\"2025-10-23T15:56:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/secrets-internet-of-things\\\/\"},\"wordCount\":1342,\"publisher\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/secrets-internet-of-things\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/07\\\/featuredimageiot.png\",\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/secrets-internet-of-things\\\/\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/secrets-internet-of-things\\\/\",\"name\":\"Secrets of the Mysterious & Ubiquitous Internet of Things - Firewalls.com\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/secrets-internet-of-things\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/secrets-internet-of-things\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/07\\\/featuredimageiot.png\",\"datePublished\":\"2017-07-20T14:35:37+00:00\",\"dateModified\":\"2025-10-23T15:56:19+00:00\",\"description\":\"The Internet of Things (IoT) is constantly growing. By 2018, there will be more IoT devices on the planet than humans to operate them.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/secrets-internet-of-things\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/secrets-internet-of-things\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/secrets-internet-of-things\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/07\\\/featuredimageiot.png\",\"contentUrl\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/07\\\/featuredimageiot.png\",\"width\":780,\"height\":330,\"caption\":\"firewalls iot internet of things security cyber\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/secrets-internet-of-things\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Secrets of the Mysterious &#038; Ubiquitous Internet of Things\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/\",\"name\":\"Firewalls.com\",\"description\":\"Your Home For Cyber Security News, Stories, &amp; Tutorials\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#organization\",\"name\":\"Firewalls.com\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/08\\\/BrandedLogo-TagLineBelow.png\",\"contentUrl\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/08\\\/BrandedLogo-TagLineBelow.png\",\"width\":365,\"height\":85,\"caption\":\"Firewalls.com\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"http:\\\/\\\/www.facebook.com\\\/firewallscom\",\"https:\\\/\\\/x.com\\\/firewallscom\",\"https:\\\/\\\/www.linkedin.com\\\/company-beta\\\/1439857\\\/\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/firewallsDotCom\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#\\\/schema\\\/person\\\/8e89a2f96065af1717d00dfd06dca962\",\"name\":\"Andrew Harmon\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g\",\"caption\":\"Andrew Harmon\"},\"description\":\"Andrew Harmon was the Director of Marketing for Firewalls.com, co-host of the Ping podcast, and engineer-to-English translator of the network security lexicon. Andrew focused on creating content for small business owners and cybersecurity novices to make this crucial facet of modern business more approachable for non-experts everywhere.\",\"sameAs\":[\"https:\\\/\\\/www.Firewalls.com\",\"aharmon@firewalls.com\"],\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/author\\\/aharmon\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Secrets of the Mysterious & Ubiquitous Internet of Things - Firewalls.com","description":"The Internet of Things (IoT) is constantly growing. By 2018, there will be more IoT devices on the planet than humans to operate them.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.firewalls.com\/blog\/secrets-internet-of-things\/","og_locale":"en_US","og_type":"article","og_title":"Secrets of the Mysterious & Ubiquitous Internet of Things - Firewalls.com","og_description":"The Internet of Things (IoT) is constantly growing. By 2018, there will be more IoT devices on the planet than humans to operate them.","og_url":"https:\/\/www.firewalls.com\/blog\/secrets-internet-of-things\/","og_site_name":"Firewalls.com","article_publisher":"http:\/\/www.facebook.com\/firewallscom","article_published_time":"2017-07-20T14:35:37+00:00","article_modified_time":"2025-10-23T15:56:19+00:00","og_image":[{"width":780,"height":330,"url":"http:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/07\/featuredimageiot.png","type":"image\/png"}],"author":"Andrew Harmon","twitter_card":"summary_large_image","twitter_creator":"@firewallscom","twitter_site":"@firewallscom","twitter_misc":{"Written by":"Andrew Harmon","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.firewalls.com\/blog\/secrets-internet-of-things\/#article","isPartOf":{"@id":"https:\/\/www.firewalls.com\/blog\/secrets-internet-of-things\/"},"author":{"name":"Andrew Harmon","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962"},"headline":"Secrets of the Mysterious &#038; Ubiquitous Internet of Things","datePublished":"2017-07-20T14:35:37+00:00","dateModified":"2025-10-23T15:56:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.firewalls.com\/blog\/secrets-internet-of-things\/"},"wordCount":1342,"publisher":{"@id":"https:\/\/www.firewalls.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/secrets-internet-of-things\/#primaryimage"},"thumbnailUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/07\/featuredimageiot.png","articleSection":["Cybersecurity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.firewalls.com\/blog\/secrets-internet-of-things\/","url":"https:\/\/www.firewalls.com\/blog\/secrets-internet-of-things\/","name":"Secrets of the Mysterious & Ubiquitous Internet of Things - Firewalls.com","isPartOf":{"@id":"https:\/\/www.firewalls.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.firewalls.com\/blog\/secrets-internet-of-things\/#primaryimage"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/secrets-internet-of-things\/#primaryimage"},"thumbnailUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/07\/featuredimageiot.png","datePublished":"2017-07-20T14:35:37+00:00","dateModified":"2025-10-23T15:56:19+00:00","description":"The Internet of Things (IoT) is constantly growing. By 2018, there will be more IoT devices on the planet than humans to operate them.","breadcrumb":{"@id":"https:\/\/www.firewalls.com\/blog\/secrets-internet-of-things\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.firewalls.com\/blog\/secrets-internet-of-things\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firewalls.com\/blog\/secrets-internet-of-things\/#primaryimage","url":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/07\/featuredimageiot.png","contentUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/07\/featuredimageiot.png","width":780,"height":330,"caption":"firewalls iot internet of things security cyber"},{"@type":"BreadcrumbList","@id":"https:\/\/www.firewalls.com\/blog\/secrets-internet-of-things\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.firewalls.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Secrets of the Mysterious &#038; Ubiquitous Internet of Things"}]},{"@type":"WebSite","@id":"https:\/\/www.firewalls.com\/blog\/#website","url":"https:\/\/www.firewalls.com\/blog\/","name":"Firewalls.com","description":"Your Home For Cyber Security News, Stories, &amp; Tutorials","publisher":{"@id":"https:\/\/www.firewalls.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.firewalls.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.firewalls.com\/blog\/#organization","name":"Firewalls.com","url":"https:\/\/www.firewalls.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png","contentUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png","width":365,"height":85,"caption":"Firewalls.com"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/firewallscom","https:\/\/x.com\/firewallscom","https:\/\/www.linkedin.com\/company-beta\/1439857\/","https:\/\/www.youtube.com\/user\/firewallsDotCom"]},{"@type":"Person","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962","name":"Andrew Harmon","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g","caption":"Andrew Harmon"},"description":"Andrew Harmon was the Director of Marketing for Firewalls.com, co-host of the Ping podcast, and engineer-to-English translator of the network security lexicon. Andrew focused on creating content for small business owners and cybersecurity novices to make this crucial facet of modern business more approachable for non-experts everywhere.","sameAs":["https:\/\/www.Firewalls.com","aharmon@firewalls.com"],"url":"https:\/\/www.firewalls.com\/blog\/author\/aharmon\/"}]}},"_links":{"self":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/12340","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/comments?post=12340"}],"version-history":[{"count":69,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/12340\/revisions"}],"predecessor-version":[{"id":26113,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/12340\/revisions\/26113"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/media\/12360"}],"wp:attachment":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/media?parent=12340"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/categories?post=12340"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/tags?post=12340"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}