Five lessons learned on the “Security Of Things” from the Jeep Cherokee hack aftermath (emphasis added):

This is the one of the most dramatic demonstrations to date of the cybersecurity challenges that will accompany the growth of the Internet of Things (IoT). And, it offers an opportunity to make some broader observations about the changing landscape of cybersecurity as systems become increasingly connected and decentralized.

Here are five takeaways on the Security of Things (SoT) that designers—as well as companies building products for the cybersecurity market—should keep in mind as they build increasingly complex and connected systems:

1. Connectivity has outpaced security

In the rush to increase connectivity, manufacturers—and not just vehicle manufacturers –are often giving insufficient attention to the additional security exposures created when complex systems become increasingly linked. More connections mean more pathways and back doors that could be exploited by a hacker—especially when a system’s own designers may not be aware that those pathways and back doors even exist. To address this, designers need better tools to enable them to fully understand all of the ways that information will be able to move around a complex, dynamic, distributed system.

This is just one of the five, with all being well thought out. Internet of Things vendors need to consider a lot to keep the world safe in the coming era where device connectivity will be a requirement rather than a feature. As IoT overtakes traditional computing, the attack surface is going to increase exponentially, whereby every device – such as your refrigerator, toaster, washing machine, etc. – becomes a potential vulnerability waiting to be exploited by malicious actors.