Definition:
This occurs when a UHNW principal grants permanent, un-monitored remote access to a third-party vendor (e.g., a smart home installer, AV specialist) for maintenance..
The Problem
UHNW homes rely heavily on integrated smart technology (Crestron, Lutron, high-end security systems). These systems are installed and maintained by specialized, non-IT vendors who require permanent, remote access for maintenance.
This remote access is often implemented via a static, un-monitored “backdoor” into the principal’s network. This trusted vendor’s system becomes a permanent, un-patched, and un-monitored vulnerability that bypasses all standard firewall protections. The principal is trusting the security of their entire network to the weakest link in their supply chain
The Risk
•Physical Security: Remote disabling of security cameras, door locks, or alarm systems.
•Reputably Harm: Eavesdropping via compromised microphones or cameras in private areas.
How does this happen?
We’ve all seen movies where this happens. The principal’s spouse lets the TV repair man in and when they least expect it, the repair person installs a listening device in their telephone or in the network outlet. You don’t need to worry about something like that happening anymore. Most people are not James Bond or his evil villain. Additionally, back in those days we didn’t have mobile phones, smart home devices, or the internet of things (IoT devices).
What has happened with the introduction of all of this technology, is that now there are multiple fronts that you must stay aware of when it comes to network or telecommunications security. Not only are governments and bad actors using your smart TV or your smart fridge to get into your home network, but it’s not even very hard anymore. Unfortunately, most home appliances require some form of internet connectivity to stay up-to-date with it’s running software. Some appliances won’t even work unless they have access at all times. It makes you wonder if they were in the right state of mind when they decided this?
The Breakdown
As more and more devices require a network, it makes it increasingly difficult to keep track. Many of these devices are still requiring older wireless standards which typically come with poor encryption settings. If you have a large property or multiple homes, it becomes even more of a mess. The kicker with all of this, is that a frigo manufacturer is going to use the most cost effective parts to ensure the highest profit margins. That means they are probably using older hardware, but additionally, they are not required to continue to manage the security of those network components installed in their products.
It’s not just imperative to regularly review what devices are on your network, but also identify if those devices can be upgrades or at least the software be upgraded to ensure full security. This includes home appliances, smart devices, swipe badges, security panels, cameras, wireless access points, mobile phones, tablets, PCs, servers, and all network equipment to name a few. Every site , whether it’s your home, guest house, or yacht will have different devices which will need to be considered. All it takes is one alarm panel, one burner phone or one guest house wifi to open yourself up to bad actors who are ready to pounce.
As you know, AI is trending heavily. I’ve read reports that even hackers are now using automation and AI to do their jobs. They can save tens to hundreds of hours by using AI to do all of the scanning and attempts for them. Once the AI is done, the hackers have a list of people who they can take advantage of and what compromised equipment allowed them in.
What can be done?
This all sounds like a lot of work.’ You’re right. It’s an extreme amount of work, but well worth protecting your family and your identity. All that needs to be done is to have a network assessment performed over your physical equipment, as well as any cloud you may use, and lastly some security policies across all of your devices. You want to know what, and who is using your network. In other words, you want to know who is in your home and be notified if there are any shady incidents happening. All of this can be automated and your Chief Security Officer can be prepared. If all of this is done correctly, then you can live your life just like you are now, but you will be protected at every entry point. Have you had your home, business, properties checked this year?
Did you know your smart home’s security system could be at risk from a third-party vendor’s un-monitored remote access? Read more about how to secure your home in our latest article.