4 min read  | IoT security

Understanding cybersecurity and IoT AI-powered attacks

Recently, I was on the phone with one of my nephews. We were chatting about school and how things have been since the beginning (and end) of the lockdown. Because of work, I’d been unable to make the time to drive down to Sydney to see him.

He asked me how work had been and brought up an article he had read recently on how AI, while being incredibly useful, can also be weaponised destructively in the wrong hands.  I agreed and asked, “Did you know there’s even the threat of self-learning automated malware now? I don’t think we’ve even begun seeing the next generation of AI attacks.”

Safe to say, I put the fear of the big, bad world in my nephew. Unfortunately, it’s not just him who needs to stay on guard against these types of attacks. Businesses are especially vulnerable to this precarious relationship between cybersecurity and IoT AI-powered attacks. This is more so with the introduction of sophisticated IoT devices to the market.

Unfortunately, this is further compounded by the fact that deep fake scams, which leverage AI and natural language technology to fabricate audio and video snippets of real people, will become a $250-million problem this year. So there’s that too.

Inspired by the conversations I’ve been having with my family and clients, therefore, I thought I’d pen down a few thoughts on what cybersecurity for IoT AI-powered attacks will look like this year.



Today, an increasing number of businesses are incorporating IoT devices into their operations. From mobile card readers and EPOS systems to tracking devices, we’re now becoming irreversibly dependent on internet-connected tools and equipment that make routine activity much more efficient.

In fact, it’s estimated that by 2023, companies will invest up to $1.1 trillion in IoT.

In tandem with our reliance, however, cybersecurity and IoT AI-powered attacks are becoming two issues that come to a head-to-head battle more frequently. Here, one of the most common examples is the increasing security risk associated with smart home systems that are becoming more common in homes across Australia.

According to Deloitte, some of the biggest cybersecurity threats associated with the IoT environment include:

The lack of a proper security and privacy strategy

Inadequate security awareness among IT engineers and architects

A lack of device and systems monitoring for threat detection

A lack of security safeguards incorporated into product design

Poor incident-response mechanisms and processes

While these are just a few of the risks Deloitte identified, I believe they are some of the most significant. At a time when cybercriminals are more advanced than at any time in history, we need to step up our cybersecurity game alongside the increasing introduction of IoT devices to the workplace.

With the connection between cybersecurity and IoT AI-powered attacks becoming stronger, there’s a need to re-evaluate how we define and approach organisational security.



This is going to be a big question for businesses going forward. Apart from what we now know as ‘standard’ security processes, how do you ensure the security of IoT devices?

Continuous cybersecurity monitoring with the support of advanced software, risk assessments, penetration testing, threat modelling, increased awareness and education among staff and ensuring accountability and ownership across your IoT security strategy are important steps in this process.

Given how rapidly this niche of cybersecurity is evolving, seeking the support of an experienced security team may also be a good idea as they have the resources and knowledge to ensure your practices are up-to-date.



At Triskele Labs, my team of security experts have experience working in a range of security environments, each of which requires varied tools, resources, and knowledge. We specialise in meeting your security requirements, regardless of how challenging they are.

We also provide cybersecurity consulting services on cybersecurity for IoT AI-powered attacks. Speak to us today if you have any questions or concerns.