As the South African Internet of Things (IoT) market continues its exponential growth, projected to reach R223,07-billion by 2029, the Communications Risk Information Centre (COMRiC) is raising the alarm over increasing security risks associated with the proliferation of IoT devices and solutions across various sectors.

With the number of mobile IoT connections in South Africa expected to hit 53-million by 2030, IoT adoption is surging in sectors such as healthcare, retail, mining, and agriculture. This unprecedented growth, however, also opens the door to significant security challenges.

Advocate Thokozani Mvelase, CEO of COMRiC, says it is becoming increasingly important for companies and public sector entities to relook at robust IoT security measures to protect sensitive data and critical infrastructure from cyber threats.

“As IoT adoption accelerates, so do the risks associated with weak security protocols and insufficient safeguards. It is imperative that businesses, developers, and end-users alike take proactive steps to secure their IoT ecosystems.”

The rapid deployment of IoT solutions, including smart water and energy management in commercial spaces and remote healthcare technologies, highlights both the potential and the vulnerability of IoT in South Africa. The rise in connected devices means more points of entry for cybercriminals, and the consequences of breaches can be catastrophic, ranging from data theft to operational disruptions.

Many IoT devices lack strong authentication mechanisms, making them susceptible to unauthorised access. Businesses must implement strong, multi-factor authentication and role-based access control (RBAC) to prevent unauthorised use.

Data transmitted between IoT devices and servers, says Mvelase, can be intercepted if not properly encrypted. End-to-end encryption protocols, such as TLS/SSL, should be used to safeguard data in transit and at rest.

He also says outdated firmware is a common vulnerability. Secure, over-the-air (OTA) updates with cryptographic validation must be enabled to ensure that only authenticated updates are applied.

Without secure boot processes, Mvelase says malicious code can be injected at startup. A secure boot process that verifies the integrity and authenticity of firmware is essential.

Many IoT devices use insecure network protocols or expose unnecessary services that can be exploited. Disabling unnecessary services and using secure protocols like HTTPS and SSH can significantly reduce the attack surface.

He adds that devices deployed in unsecured locations are prone to tampering. Tamper-resistant hardware, encrypted data storage, and physical security measures are critical for protecting IoT devices while without proper monitoring, malicious activities can go undetected. Implementing robust logging and monitoring solutions is essential to gain visibility into device activity and detect anomalies.

Mvelase says IoT devices often collect vast amounts of personal data, which can be exposed through weak security. Data collection should be minimised, anonymized where possible, and developed with privacy-by-design principles.

He adds that compromised components from third-party suppliers can introduce supply chain vulnerabilities and conducting thorough security assessments of suppliers and secure sourcing practices are vital to mitigate risks.

COMRiC urges organisations to adopt comprehensive IoT security frameworks and to engage in regular security testing, including penetration testing and vulnerability assessments.

“We cannot afford to be complacent. The stakes are too high. As we continue to leverage IoT for growth and innovation, security must remain a top priority,” Mvelase says.