Bernard Aybouts - Blog - Miltonmarketing.com

Approx. read time: 8 min.

Post: IoT devices pose a significant cybersecurity risk than most realize

IoT devices pose a significant cybersecurity risk than most realize. Unsecured IoT devices provide an easy gateway for criminals looking to get inside a network. Danny Palmer discusses why businesses and consumers should think twice before connecting.

Security risks are increasing as more and more people connect using IoT devices. I talked with Danny Palmer about the threat facing consumers and businesses, the following is an edited transcript of our interview.

Danny: IoT devices are the new kid on the block when it comes to internet active products, and that goes back to 20 years to when people were first really connecting their computers, their desktops, their laptops to the internet. In many ways, it feels as though we’re at the same stage of IoT devices. A lot of people in their homes, a lot of organizations in their offices and other buildings are rushing in and applying these IoT devices to their network.  These can include things like monitors, sensors, some of them are everyday products like your kettle.

These are providing benefits to employees and a lot of times they’re saving costs, they’re saving energy, and organizations really want to make efficiencies and make savings like that. But like every product on the internet, if it’s not secured properly it can mean a way in for attackers, and unfortunately, many IoT devices are built with almost no security at all. If the device is discoverable on the internet, and it’s connected to the rest of the network, it’s an easy to use gateway (node) for attackers.

Karen: Can you expand on any specific examples of this?

Danny: Yes, there’s an infamous example, which is spoken a lot about in the cybersecurity community about how an internet connected fish tank, served as an entry point for a cyber attack, which is basically … The attackers found the fish tank on the internet using a search engine called Showdown. It was basically a directory of every internet connected device out there. This cyber-connected fish tank was not properly secured, so the attackers could get into that.

What they did then is they used it as an entry point to the network, which because it was connected on the same network as computers and everything else you’d expect, they were able to move laterally into other parts of the network and find their way into the systems. Basically, because the fish tank was on the same network as the rest of their computers, it provided a gateway for the attackers to get in and do things. If this fish tank had been internet connected and on a separate network to everything else, it would have been fine but because it was a flat network with everything on the same internet connection, it provided an easy way in for the attackers.

That’s just one of many infamous examples of how the internet of things and cybersecurity issues are becoming more and more common. It’s things that might sound kind of far-fetched, but they’re becoming very real issues.

How the IoT is failing to learn the security lessons of the past (IoT devices pose a significant cybersecurity risk than most realize)

The massive cyberattacks which took down some of the most popular websites on the internet show that device manufacturers are not learning from the mistakes of the past.

The Longevity Blueprint: AI-Powered Health Optimization

Current step:1AI-Human Medical Analyzer: Smarter, Personalized Health
2AI-Human Medical Analyzer: Smarter, Personalized Health

> SYS.HEALTH: AI-Human Medical Analyzer_

// Revolutionize Your Diagnostics

Experience the perfect blend of cutting-edge AI precision and expert human care. Our revolutionary analyzer turns your raw health data into personalized, actionable insights tailored just for you.

> INITIALIZING_BIOMETRIC_SCAN...

[+] DATA_INPUT

Securely upload complex health parameters, including lab bloodwork and comprehensive medical history.

[+] PROCESSING

Advanced algorithmic parsing combined with human-level oversight ensures hyper-accurate data interpretation.

[+] OUTPUT_MATRIX

Receive smarter, faster, and truly personalized care strategies to take immediate charge of your health journey.

A name/nickname is required to continue.

> TRANSLATION_MATRIX_ACTIVE...
[ LANG_EN ]
Knowledge Heals, Prevention Protects
[ LANG_HI ]
ज्ञान ठीक करता है, रोकथाम सुरक्षा करती है
[ LANG_ZH ]
知识治愈,预防保护
[ LANG_JA ]
知識は癒し、予防は守る
[ LANG_HE ]
הידע מרפא, המניעה מגנה
[ LANG_AR ]
المعرفة تُشفي، والوقاية تحمي
[ LANG_FR ]
La connaissance guérit, la prévention protège

> SYS.AUTH: Data Processing Consent_

[ AWAITING_AUTHORIZATION ] By providing consent, you allow us to process your uploaded data through our proprietary AI-Human analysis system.

  • [+] SECURE_REVIEW: This ensures your information is carefully reviewed using advanced AI technology and certified professional oversight to deliver personalized health insights.
  • [+] PRIVACY_LOCK: Your privacy is our strict priority. Your data will only be used for this specific diagnostic purpose.

> SYS.UPLOAD: Share Medical Records [OPTIONAL]_

[ USER_CONTROL_ACTIVE ] Uploading your medical records during registration is entirely optional. You can choose to bypass this step and provide data later if it suits your timeline.

You dictate the data flow: share as much or as little as you’re comfortable with, and let us guide you toward better health.

[+] FORMAT_SUPPORT

We accept all file formats, including photos, PDFs, text documents, and raw official medical data.

[+] DATA_YIELD

Increased inputs correlate with higher precision. The more info you share, the better we tailor your personalized insights.

> NEXT_STEPS: Post-Registration Protocol_

Once your registration is complete, a human specialist from our team will personally reach out to you within 3-10 business days. We will discuss your health journey and map out exactly how we can support you.

About the Author: Bernard Aybout (Virii8)

Avatar Of Bernard Aybout (Virii8)
I am a dedicated technology enthusiast with over 45 years of life experience, passionate about computers, AI, emerging technologies, and their real-world impact. As the founder of my personal blog, MiltonMarketing.com, I explore how AI, health tech, engineering, finance, and other advanced fields leverage innovation—not as a replacement for human expertise, but as a tool to enhance it. My focus is on bridging the gap between cutting-edge technology and practical applications, ensuring ethical, responsible, and transformative use across industries. MiltonMarketing.com is more than just a tech blog—it's a growing platform for expert insights. We welcome qualified writers and industry professionals from IT, AI, healthcare, engineering, HVAC, automotive, finance, and beyond to contribute their knowledge. If you have expertise to share in how AI and technology shape industries while complementing human skills, join us in driving meaningful conversations about the future of innovation. 🚀