The Friendly Giant – Part 2: Lenovo Enters IoT Arena and Increases its’ Cyber Security Presence

Blog / The Friendly Giant – Part 2: Lenovo Enters IoT Arena and Increases its’ Cyber Security Presence

OK, OK – I’m late.  I know. I promised the 2nd part of my trip to the Lenovo North American Headquarters two weeks ago, but would you believe me if I told you I was in sunny California – and then Montreal?  Well, believe it or not; that’s where I was.  It’s tough to write articles when you’re driving 12 hours a day or sitting in Economy, on a cross-country flight.

I also need to make a correction.  It was pointed out by a loyal Reader (actually my wife), that the Friendly Giant’s outfit wasn’t green, but tan-coloured.  However, she cut me some slack, as I watched most of the episodes on a Black & White TV.  Truth be told, I was probably confusing him with the big guy who sells green beans.

Two weeks ago, I wrote that Lenovo were moving aggressively into the Internet of Things (IoT) arena, with the release of new products designed for smart automation of the home.  It’s also expected that many more products will be released in the near future.  With Lenovo entering this market, it adds legitimacy and clout; the market was previously populated by small boutique manufacturers, who lacked the resources to have global impact.  Lenovo have very deep pockets and a Marketing and Distribution System that is world-class.

With these products becoming ubiquitous in the home, it leads to some disturbing scenarios that could compromise Privacy and Security.  There are two primary concerns:

  1. For these devices to be true convenience items in the home, they need to talk to each other – and be controlled by a central interface that is dead-simple to use.  Enter the Google Home line of products.  Amazon have a similar, but competing product (Alexa), but we’ll stick with the Google unit.  At the simplest level, these devices translate speech into actionable commands.  That’s a standard function that most Smartphones have built-in.  Where things get a bit creepy, is that these devices listen ALL THE TIME and have very sensitive microphones.  They hear everything that is said.  If it just stayed in your home, you’d think what’s the big deal?  But it doesn’t.  Connected to the Internet, these devices upload this content to Google, where they store it and use millions – soon to be billions – of similar conversations, to build a more accurate library of the speech-to-actions; it makes the device more accurate.  But it’s also recording and analyzing your every word.  I wrote about one of these devices in a previous article, and how the HelpDesk at Amazon was able to go back and listen to a couple’s conversation, to troubleshoot a faulty command sequence. Are you creeped-out yet?
  2. IoT devices all contain micro computers embedded in their circuitry; it’s the part that makes them Smart.  However, with limited space and computing power, the Designers focus on features, not Security.  That makes them very susceptible to hacking attacks.  If one unit is compromised, the hackers could gain access to the complete network.  With access to your network, they can control any number of connected IoT devices, and even gain access to computers, storage devices, and files.  The imagination runs wild with all sorts of dark thoughts; do we really need a Peeping Tom manipulating all of the device cameras sprinkled around your home or office’s IoT devices, Smartphones or Webcams? Pick your doomsday scenario and apply a hacked IoT device to it!

The challenge is to lock down these systems BEFORE they grow into an unmanageable tangle of WiFi protocols and IP addresses.  It’s impossible to correct CORE deficiencies in these IoT devices, so the best way is to tighten up Security on the network they connect to.  That means two things:

  1. A separate WiFi network – Independent from those used for data connections to the Internet and other computers – needs to be implemented for IoT devices ONLY.  Nothing else connects to it, but IoT.  It must have a password (key) that is strong (minimum 15 characters.)
  2. Firewalls – Even those used at home – need to be much more robust and adept at blocking attacks and unauthorized access.  Sophisticated Firewalls usually have a monthly subscription cost, that allows them to tap into a central database of the latest attack types.  It provides much greater Protection.

It seems that the Home Network is no longer a simple router and few cables.  Home networks will start to become as sophisticated and complex as some Business Network environments. That will drive up costs and require some Management.  IoT devices will be most prevalent in the home to start, but expect them to become commonplace in the office, shortly thereafter.  Offices will require a third independent WiFi Network for IoT devices.

And so, what are Lenovo – our Friendly Tech Giant – doing about it?  They recognize potential threats, and their IoT devices will have a higher level of Security built into them.  They’re also coming to market with a suite of products and add-on’s that will enhance the Security of their computers, laptops and networks.  Lenovo products have always been well-engineered and thoroughly tested.  That costs a few dollars, but it might be worthwhile to invest in QUALITY IoT devices and networks, in order to avoid trouble in the future.

If you would like more information about how to configure a safe and secure IoT network, please contact me or you Account Manager for some stress-free IoT.

Imagine The Friendly GiantRusty the Rooster and Jerome the Giraffe speaking to Google Home.  Or, maybe not …



Dave White 
stress-free IT 

/Partners /Systems /Certifications

TRINUS is proud to partner with Industry Leaders for both hardware and software who reflect our values of reliability, professionalism and Client-focused service.