- IoT For All
- Posts
- The Biggest IoT Security Mistakes—And How to Fix Them
The Biggest IoT Security Mistakes—And How to Fix Them
Plus our top IoT stories of the week!
Hello readers,
Welcome to the IoT For All newsletter! This week we’re talking about the dos and don’ts of IoT security, multi-IMSI SIMs and more!
The Biggest IoT Security Mistakes—And How to Fix Them

Now that IoT is mission-critical across industries, it means the cost of getting security wrong keeps climbing. One in three breaches now involves an IoT device, and breach costs trend higher when IoT is in the mix. At the same time, the IoT security market is projected to triple by 2030, proof that businesses are investing to close the gap.
1. Default and weak credentials
The easiest way in is still the most common: factory logins like “admin/admin,” weak passwords, and hard-coded backdoors. Attacks scale because bots constantly scan the internet for devices left on defaults. This is exactly how Mirai roped cameras and routers into a record DDoS. Fix it by enforcing immediate credential rotation on deployment, mandating strong, unique passwords, and layering multi-factor authentication (MFA) wherever admin access exists.
2. Infrequent and insecure firmware management
Unpatched firmware turns known CVEs into open doors, and many fleets still run on “fire-and-forget” updates. This drives malware/ransomware risk and costly downtime. Move to a lifecycle approach: over-the-air (OTA) updates for scale, cryptographically signed releases verified on-device, and secure boot to anchor integrity from power-on. These controls cut exposure without rolling trucks (https://www.iotforall.com/over-the-air-firmware-updates-in-iot).
3. Flat networks with no segmentation
When cameras, PLCs, and laptops share the same flat network, one compromised sensor becomes a beachhead for lateral movement. Segmentation and microsegmentation contain the blast radius and have been shown to reduce breach costs materially. Pair VLANs/firewalls with a Zero Trust model: verify every device/user, enforce least privilege, and treat each connection as hostile until proven otherwise.
4. Unencrypted data in transit and at rest
Unsecured telemetry and config stores invite eavesdropping, tampering, and privacy violations and are still far too common in IoT communications. Encrypt everywhere: TLS for device-cloud links (ideally mutual TLS with device and server certs), plus disk/file-level encryption on endpoints. Use managed certificate provisioning/rotation to keep keys fresh at fleet scale.
5. No security-by-design (and weak governance).
Rushing to ship cheap hardware without secure storage, patch paths, or privacy controls leaves defenders to clean up systemic risk. Shadow IoT—unsanctioned gadgets on corporate networks—multiplies the attack surface, and human error drives the majority of incidents. Mandate secure-by-design requirements with suppliers, require SBOMs to manage third-party code risk, and back it with continuous training and vendor assessments against recognized frameworks.
Strong IoT security isn’t a one-and-done project. It requires constant vigilance and structures to support it. Rotate credentials and add MFA at day one, make signed OTA updates routine, segment ruthlessly under Zero Trust, encrypt end-to-end with managed certs, and require security-by-design from every vendor. The companies that normalize these basics will avoid the expensive lessons everyone else is about to learn.
📖 Top Articles
Connectivity is something every modern business depends on. When it fails, even for a short time, the impact is immediate. Payments cannot be processed, digital displays go dark, and connected devices stop sending the data they are built to deliver. Relying on a single mobile network leaves companies exposed to problems they cannot control.
The manufacturing industry is navigating growing complexity as economic pressure, labor constraints, and digital transformation converge across operations. This year’s State of Production Health report from Industry Week and Augury explores how manufacturers are adjusting through smarter AI adoption, workforce enablement, and efforts to connect siloed systems. It offers insight into where the industry stands today and highlights the priorities shaping its future. | OTA (Over-the-Air) updates have become an essential component in the management and evolution of connected devices. They enable seamless deployment of software patches, performance improvements, and new features without requiring physical intervention, ensuring that IoT devices, smartphones, and other embedded systems stay secure and up-to-date. By leveraging OTA updates, businesses can enhance user experience, reduce maintenance costs, and respond swiftly to emerging threats or technological advancements. |
🔥 Rapid Fire
Starlink’s EchoStar spectrum deal could bring 5G coverage anywhere
Smart water management with IIoT and data analytics
5G Advanced and RedCap may be the missing link for IoT
Solid-state device harvests body heat to power battery-free wearables and IoT sensors
Battery-free e-Sense tag aims at ambient IoT platform expansion
Improved fruit detection using advanced computer vision techniques
🎙️ The IoT For All Podcast
In this episode of the IoT For All Podcast, Terrence DeFranco, CEO of IotaComm, joins Ryan Chacon to discuss the intersection of IoT, sustainability, and infrastructure modernization. The conversation also covers repurposing licensed wireless spectrum, smart buildings and cities, how data drives businesses, integrating IoT with emerging technologies, connecting legacy systems, and bridging the digital divide.
🗓️ Events & Webinars
The Things Conference 2025 is the world’s most exciting event about LoRaWAN with a focus theme on Edge IoT, bringing together the latest advancements in LoRaWAN, Cellular IoT, AI at the edge, energy harvesting and single-board computing.
From smart infrastructure and industrial automation to AI-powered asset tracking and ultra-low power sensor networks, this global event provides everything you need to build and scale your IoT solutions. Get hands-on with 100+ cutting-edge IoT devices at the Wall of Fame, connect with 1,500+ global attendees, including industry leaders, solution builders and buyers, and dive into expert-led workshops and real-world use cases that are transforming industries today.
The Things Conference 2025 is the must-attend event for anyone looking to stay ahead in IoT and drive innovation toward a smarter, more connected future.
Secure your ticket now with code "iotforall25” for 25% off Explorer tickets.
![]() | IoT Tech Expo Europe24-25 September 2025 From smart cities to connected supply chains, the opportunity to optimise operations and drive efficiency through IoT has never been more compelling. IoT Tech Expo Europe, taking place on 24–25 September 2025 at RAI Amsterdam, will deliver cutting-edge insights into real-world deployments and the strategic decisions behind them. Discover use cases you hadn’t imagined, uncover hidden risks, and gain a competitive edge by learning what’s shaping the next wave of IoT innovation. |