Beacons are small, wireless transmitters that use low-energy Bluetooth technology to send signals to other smart devices nearby. WordStream.com
Offices and personal spaces are becoming more IoT infused. Beacons are used to control systems and gather data. Beacons are used in retail, conferences and events, tourism, asset tracking and door locks. It is important to know what security issues are inherent when setting up the hardware. Beacons can be attacked and piggybacking & cloning are threats.
Companies are using beacons to understand their audience. By tracking one’s activities and locations companies can better hone their marketing strategies in the retail market.
Your mobile device may be the recipient of these beacons or ultrasonic emissions. You may receive unwelcomed advertisements. You may be unwillingly tracked for your location and app usage. Or you may purposefully use this to receive information for tours, news feeds, coupons or purchasing event tickets.
The industry has not agreed upon a way to architect and implement some of the risks associated with the explosion of IoT and connected devices. Therefore, it is particularly important for security professionals to take the responsibility for securing their environment.
To protect your environment and yourself:
- Stay up to date on OS and patches
- Change any default configurations and passwords
- Turn off WiFi and Bluetooth when not in use
- Turn off location services when not needed