Private businesses must lead the offensive against the ‘Army of Things’ by demanding the elimination of password based security. Credit: Thinkstock On Oct. 21 2016, a severe distributed denial-of-service (DDoS) attack that affected Amazon, Etsy, GitHub, Spotify, Twitter, New York Times, Vox, Airbnb, Netflix, Reddit, and many others employed a massive botnet made up of hundreds of thousands of internet connected devices infected with malware called Mirai. The device army exploited default and weak passwords to direct many gigabytes of data to targeted servers.One can make the case that much of the blame for this and other recent DDoS attacks lies with Internet of Things (IoT) device and networking equipment manufacturers. In the rush to bring new devices to market, manufacturers too often leave security as an afterthought, opening huge gaps that hackers will eventually exploit. Builders of consumer-oriented IoT devices and remote control smartphone apps are especially at fault because there should never be any expectation that consumers have the incumbent technical knowledge to properly configure IoT devices and home routers.[ BACKGROUND: An IoT bonnet was partly behind Friday’s massive DDoS attack ]Importantly, virtually all consumer oriented IoT devices and router systems use passwords as the primary user authentication mechanism for configuration. In the bright light of the recent DDoS attacks, every technology professional in companies victimized by DDoS attacks should recognize the IoT security situation for what it is: technological catastrophe. Technology professionals managing security for large companies should know how to properly configure network routers and IoT devices. This is not true of the millions of consumers around the world installing mass market routers and IoT devices in their homes. While large companies may not think weaknesses in consumer IoT products are something they should worry about, larger companies are more attractive targets for DDoS attackers.Small and midsize businesses are also at risk but many hackers want to make political or social statements as we saw in the Oct. 21 attacks. Such attacks affect consumers only to the extent service providers such as Amazon or Netflix are affected. It should be noted that consumers will not be sympathetic to an argument casting Amazon and Netflix as victims. That these companies’ websites are inaccessible is all that concerns the consumer. There is an overarching solution – elimination of passwords as an IoT and networking device authentication method. Targets of DDoS attacks, regulators, and legislatures hold the keys to ensuring that this solution is implemented.The best approach will come from the private sector. Companies targeted by DDoS attacks should demand that networking equipment and IoT device manufacturers eliminate password authentication and improve other aspects of security. This can be very effective because manufacturers of consumer-oriented IoT and networking devices produce similar products for business customers.Products built for businesses typically have higher profit margins so business customer dollars are inherently more powerful. There is little doubt that manufacturers will resist, claiming that customers will not accept change or pay more for better security. A counterargument is that manufacturers lack imagination. They can continue to offer current technologies as they introduce more secure devices, raising prices on older systems higher than newer, more secure alternatives. The less secure systems will gradually fade away. Business customers can also demand discounts when buying enterprise networking and IoT equipment on the basis that less secure consumer-oriented products raise cybersecurity liability for all businesses.Another solution is ‘soft regulation’ where regulators become much more vocal in moving device manufacturers toward more secure authentication methods and simpler configuration procedures. Government agencies can help the regulators by mandating that government buyers acquire only those devices meeting a much higher security standard. Governments are part of the preferred market forces approach.The least desirable solution comes from the legislative hammer. Governments could employ ‘hard regulation’ through new legislation. Lawmakers might justify such action by raising the argument that DDoS attacks can affect infrastructure critical to national security.Until serious pressure is applied on IoT device manufacturers by every company in the crosshairs of DDoS attackers, exploding numbers of IoT devices will become soldiers in an ever more devastating hacker army. Related content opinion In 2017, real action on cybersecurity will happen after loss of life Public outrage in the wake of a hybrid terrorist attack will finally overcome the propensity of our national leaders to place intelligence gathering convenience above internet security. By James Thackston Jan 05, 2017 3 mins Government Internet Security Internet of Things opinion Solve cybercrime by permanently linking physical space and cyberspace Virtually every cyber threat is enabled by the failure of most online identity verification systems to reliably connect a person’s physical identity with his or her cyber identity. Solving this problem will dramatically improve global cyber sec By James Thackston Dec 05, 2016 4 mins Data Breach Google Play Cyberattacks opinion Cybersecurity woes can be remedied through decentralization A discussion of how to improve the global cybersecurity situation by dispersing user personal data onto smartphones instead of storing it in large, aggregated databases. By James Thackston Nov 22, 2016 4 mins Data Breach Government Cybercrime opinion Fraud and privacy problems on the blockchain As potentially useful as blockchains can become, companies must recognize the potential for fraud and the threat to privacy posed by fraud countermeasures. By James Thackston Nov 07, 2016 5 mins Fraud IT Skills Vulnerabilities Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe