The Internet of Things (IoT) refers to the billions of physical devices around the world that are now connected to the internet, all collecting and sharing data. Im am IT role, You are no longer managing “IT gear” you’re managing Operational Technology (OT).
1. Common IoT Devices in the Workplace
You might be surprised how many “non-computer” devices are currently sitting on your companies subnets.
- IP Surveillance Cameras: High-bandwidth devices that often use PoE (Power over Ethernet).
- Smart Lighting & HVAC: Systems that allow the facilities team to control the heat or lights from an app.
- Asset Trackers: Used to keep tabs on expensive equipment like floor buffers or medical carts.
- Voice Assistants: Smart speakers in rooms used for timers or music.
2. IoT Communication Protocols
Because many IoT devices are small and battery-powered, they don’t always use standard Wi-Fi (which eats a lot of power). On the Network+ we should know these “Low-Power” alternatives
- Z-Wave: A proprietary wireless protocol that uses a Mesh Network Topology. It operates on a different frequency than Wi-Fi (around 900Mhz), so it doesn’t cause interference with your 2.4/5Ghz bands.
- Zigbee: An open-standard mesh protocol similar to Z-Wave but operates on the 2.4Ghz band.
- Bluetooth / BLE (Bluetooth Low Energy): Used for short-range connections, like a wireless mouse or glucose monitor.
- ANT+: Common in fitness and health devices (like heart rate monitors).
3. The IoT Security Nightmare
Here is the “Support Associate” reality: IoT devices are notoriously insecure.
Weak Passwords: Many come with “admin/admin” as the default, and some don’t let you change it.
No Updates: Cheap smart devices rarely receive security patches.
Privacy Risks: A smart speaker or a camera is essentially a microphone/lens on your network that sends data to a third-party server
4. How to secure IoT: The “Isolation” Strategy
If you have to put a “Smart Fridge” or an IP Camera on your network, you never put it on the same VLAN as your payroll records.
- VLAN Segmentation: Place all IoT devices on a dedicated “IoT VLAN.”
- Strict Firewall Rules: Configure the firewall so the IoT devices can talk to the internet if they need to, but they can never initiate a connection to your internal servers.
๐งช The “Exam Tip” for Network+
From my studies i’ve learned that CompTIA loves to ask about SCADA (Supervisory Control and Data Acquisition) and ICS (Industrial Control Systems). These are the “Big Brothers” of IoT. They control power grids, water treatment plants, and large-scale building automation. I you hear “SCADA,” think Critical Infrastructure and High Security
What’s Next?
We’ve Connected everything, now we need to talk about how we keep that connection alive. Tomorrow, we will dive into Network Resilience and High Availability. We’ll talk about UPS backups, NIC Teaming, and the “magic” of Clustering so that the network never goes down, even when hardware fails!
๐ Sources & Further Reading.
- CompTIA Network+ N10-009: Objective 2.1 – Compare and contrast various devices and their functions.
- The Cyber Ledger: Cloud Service Models: SaaS, PaaS, IaaS
- Jason Dion: Section 17 – Network Segmentation
This article is an independent summary of my learning journey. All trademarks and copyrighted materials belong to their respective owners.