Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Attempts to Make Smart Cities Hit a Snag

Attempts to Make Smart Cities Hit a Snag

At this point, the concept of the Internet of Things is a fairly familiar one, but that familiarity is to the Internet of Things on the micro scale--appliances with capabilities enhanced by an available connection to the Internet. There is another, more macro application to the Internet of Things: as a way to collect data in a municipal setting. However, like the IoT we are familiar with, these “smart cities” are host to many familiar problems.

The Concept of a Smart City
Like many technological developments, the idea of a smart city is built on good intentions. Through the use of technology (much of it based in the IoT), a smart city leverages collected data to functionally serve the public, embetter the services of government, and improve the quality of life for its citizenry.

That’s the idea, at least.

Unfortunately, like many of the ‘smart’ devices that the populace can interact with, the systems that these cities leverage tend to be susceptible to attack.

What These Attacks Could Do
In order to understand the potential ramifications of these kinds of attacks, it is important to first have an understanding of the kinds of systems that a smart city is built upon.

The true purpose behind creating a smart city is to make it a better place to live, and to do that, certain systems need to be put in place. These systems are powered by the data they collect. With that data, insights into correlated problems can be leveraged to solve them.

The sensors that these cities use to collect this data monitor a wide variety of factors, ranging from traffic conditions to the weather and even health-related factors like air quality and radiation. The data that is collected is then used, through the power of automation, to decide how to approach infrastructural concerns. For instance, if traffic is moving slowly in an area, these systems would deliver that data to decision-makers, allowing them to make the call to reroute traffic a different way to ease the congestion. This system just makes the decisions, too.

The big problem with this is that now, if these systems don’t have sufficient security measures in place, they leave the city’s infrastructure vulnerable to attack. Unfortunately, in an initial study of three companies who provide these kinds of smart city systems, 17 basic vulnerabilities were present in their products. These vulnerabilities included things like easily guessable passwords, bugs that could allow malware to be introduced, and opportunities for authentication requirements to be side-stepped.

Why This Matters
The harsh reality is that developing smart cities with these kinds of vulnerabilities is the geopolitical equivalent of intentionally wearing a “Kick Me” sign each and every time you went out in public. The United States of America have already learned this the hard way, as electoral systems and the energy grid have been hijacked recently. If appearances aren’t deceiving, actions are being taken to reinforce these vulnerabilities in these IoT devices, but it certainly doesn’t help if careless oversights are being made in the security of major metropolitan areas.

We’re not saying that bringing the Internet of Things to cities is a bad thing, but the security needs to be there. The same goes for businesses. If your business relies on devices that connect to the Internet, like physical security devices, smart appliances, and networking infrastructure, locking down these devices and keeping them patched is critical to keep your operations running without a hitch.

Give Total Tech Care a call at 866-348-2602 to learn about the security options we have to offer you.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 24 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Business Google Network Security Microsoft Internet Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices Hardware IT Services Disaster Recovery Android VoIP communications IT Support Smartphones Business Continuity Communication Miscellaneous Smartphone Mobile Device Small Business Network Browser Productivity Collaboration Quick Tips Cybersecurity Business Management Users Managed IT Services Upgrade Windows Phishing Data Backup Outsourced IT Ransomware Windows 10 Cloud Computing Data Recovery Office Server Save Money Passwords Windows 10 Virtualization Gadgets Saving Money Holiday Social Media Tech Term Chrome Managed IT Services Managed Service Automation Microsoft Office Computers Artificial Intelligence Facebook Operating System Cybercrime Internet of Things BYOD Wi-Fi Mobile Device Management Networking IT Support Health Hacking Spam Remote Alert Office 365 Information Telephone Systems Information Technology Covid-19 Managed Service Provider BDR Bandwidth Recovery Employer-Employee Relationship Social Engineering Mobility Router Law Enforcement Remote Monitoring Mobile Computing Application App Data Breach History Password Money Encryption Applications Big Data Human Resources Mobile Office Private Cloud Blockchain Data Storage Patch Management Paperless Office Managed IT Office Tips Apps Training VPN How To Remote Computing Government Flexibility HaaS Marketing WiFi IT solutions Vulnerability Entertainment Website Windows 7 Budget Word Bring Your Own Device Data Management Work/Life Balance Wireless Servers Infrastructure Voice over Internet Protocol Gmail Settings Data Security Google Drive Two-factor Authentication Avoiding Downtime Mouse User Error Meetings Conferencing Save Time Telephone System Staff Software as a Service Scam Machine Learning USB Risk Management Connectivity Remote Work Hacker Cleaning Vendor The Internet of Things Vendor Management Managed Services Lithium-ion battery Display End of Support Education Physical Security Safety Employee/Employer Relationship Firewall HIPAA Sports Data Protection Redundancy RMM Virtual Reality Keyboard Apple Social Digital Signage Computer Accessories Hiring/Firing Business Technology Content Management Access Control Document Management Wireless Technology Virtual Assistant Solid State Drive How to Wearable Technology Downtime Procurement Authentication Net Neutrality Printer Retail Workplace Strategy Hard Drives Instant Messaging Bluetooth Business Intelligence Help Desk Data storage Robot Excel Printing Automobile Audit Worker Biometrics IT Management Update Virtual Desktop Botnet Computing Infrastructure Google Docs Going Green Managed Services Provider IT Consultant IT Plan DDoS Identity Theft Database SharePoint Humor Unsupported Software Battery Remote Workers Shadow IT Charger Augmented Reality Processor Legal Fraud Customer Service Compliance Computer Care Environment OneNote Internet Exlporer Current Events Remote Worker Hard Drive Telephony Fax Server Samsung Cryptocurrency PDF Computing SaaS Proactive IT Value Comparison Virus Spam Blocking Best Practice Electronic Medical Records YouTube CES Network Congestion eWaste Black Market Unified Threat Management Trend Micro Wire Business Owner Mobile Evernote Windows 10s Dark mode Tablets NarrowBand Entrepreneur SMS Default App Managing Stress Cast Travel Search Tip of the week Millennials webinar Procedure Emergency Printers Saving Time Shopping Smart Office Google Search Professional Services Wireless Charging iPhone Cameras Public Cloud Shortcut dark theme Employer Employee Relationship Assessment Cost Management AI IT Infrastructure Bing Windows Server 2008 Workforce Social Networking FinTech Virtual Private Network Social Network Tools Cables Files Chromecast Television Investment Running Cable Telecommuting Employees Project Management Employee/Employer Relationships Nanotechnology ISP Cortana Colocation Printer Server Uninterrupted Power Supply Windows 365 Memory Public Computer Video Conferencing ROI Digital Signature Shortcuts Regulations Monitor Sales Transportation Warranty Bitcoin Personal HVAC Cryptomining Google Apps Computer Fan Point of Sale Rootkit Supply Chain Management Analysis Devices Reputation Workers Streaming Media Monitoring Benefits Science Administrator Batteries Digitize Enterprise Content Management Content FENG Tech Support Windows 8.1 Laptop IBM MSP Windows Server 2008 R2 Accountants Techology Thought Leadership Flash Distributed Denial of Service Credit Cards Customers Customer Relationship Management Customer relationships Smart Technology Microchip Analyitcs IT Assessment Password Management Manufacturing Audiobook Password Manager Email Best Practices Software Tips Multi-Factor Security Touchpad Supercomputer Programming Twitter Security Cameras Consultant Sync Emails Computer Tips Search Engine Managed IT Service OneDrive NIST Biometric Security Politics Business Mangement Advertising Analytics Virtual CIO Antivirus Trending Peripheral Smart Tech Addiction Best Available Amazon Netflix Notifications Digital Security Cameras Two Factor Authentication Windows 8 Using Data Copiers 5G WIndows 7 Recycling Root Cause Analysis IT service HBO Knowledge Quick Tip Music Wiring Practices Cache Smartwatch Skype Amazon Web Services Relocation Ergonomics Tablet Development Safe Mode OLED Criminal Data loss Domains Video Games Outlook Leadership PCI DSS Troubleshooting GDPR Virtual Machine Hosted Computing Fiber Optics Wireless Internet Employee Worker Commute Start Menu IaaS Online Shopping Maintenance 2FA Windows Media Player Loyalty Bloatware Messaging File Sharing Cabling Experience User PowerPoint Screen Mirroring Scalability Frequently Asked Questions Specifications Policy Books Camera Hypervisor Inventory

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code