If You Connect It, Protect It!

November 16, 2021
Digital security concept: Red padlock icon surrounded by data streams against a globe backdrop.

Credit: iStock/MF3d

Meet Humphrey


Humphrey is a gray squirrel that a friend of mine rescued as an abandoned baby squirrel. For weeks, my friend and his family nursed the young creature by hand. While Humphrey was growing, he became very friendly with the family members, often perching on their shoulders and snuggling in their arms for naps. Humphrey was permitted the run of the house and had a basket for his sleeping quarters, which he often used at night. As time passed, he grew strong enough to survive on his own and the family released him back into the wild to enjoy the life of a healthy gray squirrel. Having grown fond of his human family, Humphrey built a nest in a tree just outside their back door and still hops on laps and shoulders while the family sits together outside.

The “Tail” of Two Cities


So how does a story of a rescued squirrel connect with our timely topic of cybersecurity? As I reflected on the topic of cybersecurity, there is a rampant and significant vulnerability that exists for homeowners and enterprise businesses alike, and in many ways correlates with Humphrey’s story.


In our technology-laced society, “connected things,” or the Internet of Things (IoT), are sprawling. The IoT moniker represents the plethora of internet-connected items that provide useful but narrowly focused benefits. An estimate from SecurityToday.com states that there will be 31 billion (with a b) IoT devices installed in 2020 and more than 75 billion connected by 2025! I know in my own house, my refrigerator and stove are both connected to the internet as well as my home’s thermostat, doorbell, TVs, and smoke detectors. Additionally, there are “smart” coffee makers, slow cookers, lightbulbs, speakers and the list goes on and on. Pretty soon, if a device plugs into the wall, it will also “plug” into the internet.


So, what is the cybersecurity concern that haunts every CIO and should also haunt every homeowner and manufacturer in our country? The reality is IoT devices are engineered to be functional, inexpensive, easy to setup and easy to use, but not necessarily secure. As a result, there is a rapidly growing installation base of questionably secured devices that are providing a heyday for hackers. The true vulnerability is not necessarily losing function of an IoT device to a hacker, but rather, offering a hacker backdoor access into a corporate or home network; potentially exposing valuable data for theft or destruction. This is how Target was hacked in 2013, resulting in over $200 million in losses for the company.

This is Nuts!


Stop and consider the valuable data that lives on your home or business’s network. If a hacker were to infiltrate your environment and launch a ransomware attack, removing your access to all of this information, would you be able to recover without paying the ransom? Making matters worse, what if the hacker first destroyed your backups prior to launching the ransomware attack. Do you have offline data backups that you could use for recovery? We could stop here and write an exposé on the need to implement a resilient backup solution, but that is for another day.


Reflecting on Humphrey’s rescue, we don’t need to pause too long to recognize the risks of handling a wild animal. While Humphrey is cuter than cute, he also has sharp nails, sharp teeth, and powerful jaws. If we were only to focus on the beauty of the animal but fail to take reasonable safety precautions, a trip to the emergency room would not be unexpected. Similarly, with our IoT devices, if we only focus on their functionality but ignore their inherent security risks, we are simply in the queue, waiting for our data and systems to be victimized.

Squirrel Cage


In order to protect our sensitive data from hackers, we need to reconfigure our networks so that we can enjoy the functional benefits of our IoT devices while maintaining separation from our valuable data systems. The networking terms for this are segregation and isolation.


Reflecting back on Humphrey’s situation, he fortunately never bit or scratched his rescuers to the degree they had to seek medical attention, but if he was protected by using a cage during the day, his own safety would have been assured as well as reducing the risk of harm to the humans. Similarly, with our IoT devices, we need to consider putting our valuable assets in a “cage” in order to protect them from a possibly hacked IoT device. Additionally, since numerous IoT devices typically coexist on a network, we may also want to isolate each IoT device into their own cages to prevent a hacker from being able to continue their hack once they penetrate one device.

Stay in Your Lane


Be it a small home network or a large corporate network, segregation and isolation is a fairly easy solution to implement, although it does take planning and requires capable hardware. There are numerous guides available on the internet to give specific instructions on how to segregate and isolate devices on specific pieces of hardware, namely firewalls, switches and wireless controllers, but we will only address this conceptually.


Segregation allows our IoT devices to operate on our network and connect to the internet, but then limits their ability to “talk” to other internal network devices. This solution effectively places a firewall between each IoT device which allows a network administrator to specifically limit the connections permitted from that device to other devices. Using segregation and isolation, if an individual IoT device was compromised, the hacker would be isolated from the rest of the components in the network.

Acorns and Twigs


As squirrels use native building supplies for their nests, segregation and isolation also use their own unique set of configuration tools and settings. Most home and small office wireless routers have the ability to create an additional guest wireless network that is separated from the full access primary wireless network. Guest settings are a preconfigured segregation solution offered in many routers that will only permit connected systems to access the internet and will prevent them from connecting to devices on the other networks, wired or wireless. Additionally, some routers will also offer isolation which will prevent these devices from being able to see any other device connected to the guest wireless network. Consider connecting non-critical IoT devices to the guest network to implement segregation. For enterprise networks, segmentation is accomplished with virtual local area networks (VLANs), routing rules and access rules, which provides an enhanced level of customized protections.

IoT devices generally do not allow access to their built-in management tools, so we largely are unable to perform simple security functions on them, such as changing default usernames and passwords. As such, separation is our primary tool for securing these devices within our networks. As we seek to live in harmony with a “friendly” wild animal, be it Humphrey or our beloved IoT devices, implementing sensible safety protocols will help us all to live safely, securely and happily ever after.

 

This article originally appeared on NIST’s Manufacturing Innovation blog and is reprinted with permission

Recent Posts

April 29, 2026
Phoenix Manufacturing, Inc., founded in 1989, is a privately held family-operated small business in Enfield, Connecticut, specializing in precision machining for the aerospace industry. What began as a two-person operation in a 2,000-square-foot building has grown into a company with over 100 employees operating out of a 114,000-square-foot, state-of-the-art manufacturing facility. As a contract manufacturer, Phoenix specializes in complex, tight-tolerance components, supported by more than 40 CNC machines and a multi-axis mill/turn line. The company provides end-to-end manufacturing solutions—from engineering consultation through full-scale production—serving commercial aviation, spaceflight, and defense markets for both domestic and global customers, including leading aerospace and defense OEMs. A defining element of Phoenix’s growth has been its strategic investment in advanced manufacturing technology, particularly palletized machining centers. Since 2017, the company has added 11 machining centers integrated with palletized systems, enabling unattended, automated production and significantly expanding machining capacity. This automation journey has positioned Phoenix to better meet increasing customer demand while maximizing machine utilization. Phoenix’s commitment to quality is central to its operations and customer relationships. Managing more than 600 active part numbers, the company strives for 0 parts per million (PPM) defects and 99% on-time delivery (OTD) for major OEM customers. Its quality management system is certified to ISO 9001 and AS9100 Rev D standards, and Phoenix also holds NADCAP certifications in Nonconventional Machining and Nondestructive Testing, reflecting a rigorous, inspection-driven approach to delivering consistent, high-quality results.  Guided by a mission to deliver high-quality, cost-effective products through advanced technology and an uncompromising commitment to quality, Phoenix continues to invest in innovation, automation, and the next generation of manufacturing leadership.
April 28, 2026
Founded in 1959, Projects Inc. is a Glastonbury, Connecticut-based manufacturer specializing in precision-machined components for aerospace, industrial, and commercial applications. With 102 employees, the company operates out of 66,000 square feet of manufacturing and office space and supports customers across a range of industries, including aerospace and power generation. Projects Inc. has deep roots in the aerospace industry, where it has provided high-quality machining services for decades. Since 1996, the company has supplied FAA Parts Manufacturer Approval (PMA) components to the aviation sector. Projects Inc. received FAA Repair Station Certification in 1984. As a maintenance, repair, and overhaul (MRO) provider, Projects supports customers with repair solutions that help keep critical aerospace equipment operating safely and efficiently. Its customer base includes major aerospace companies such as Sikorsky, Pratt & Whitney, and GE Aerospace, along with airlines including United, Delta, American, and Lufthansa. Projects Inc. is Federal Aviation Administration (FAA), European Union Aviation Safety Agency (EASA), and UK Civil Aviation Authority (CAA) – approved. The company is also AS9100D and ISO 9001: 2015-certified, reflecting its commitment to quality, consistency, and industry standards. With capabilities that include prototyping, CNC machining, EDM, laser cutting, and grinding, Projects Inc. offers a broad range of precision manufacturing services supported by advanced in-house equipment and technical expertise. Today, Projects Inc. is recognized as an experienced supplier of high-quality components, with a long-standing focus on quality, reliability, and customer service.
Penn Globe logo over a room with people, possibly a conference.
February 11, 2026
Learn how Penn Globe partnered with CONNSTEP to invest in employee training, strengthen skills, and support business growth and competitiveness.
Logo of Specialty Cable Corporation (SCC) in a warehouse setting.
February 10, 2026
See how Specialty Cable Manufacturers partnered with CONNSTEP to strengthen quality systems and successfully achieve AS9100 recertification.
People in a factory setting, with the Forum Contract Manufacturing logo in the foreground.
February 9, 2026
Learn how Forum Plastics partnered with CONNSTEP to invest in supervisory training, strengthen leadership skills, and support long-term growth.
Logo of the letter
February 8, 2026
See how a Connecticut printing company partnered with CONNSTEP to improve efficiency, reduce waste, and advance environmental sustainability.
Beekley Medical logo with text
February 7, 2026
Learn how a medical products manufacturer partnered with CONNSTEP to strengthen quality systems and achieve successful recertification.
Pursuit Aerospace logo over a blurred medical equipment background. The logo is white text on a black rectangular box.
February 6, 2026
See how an aerospace manufacturer partnered with CONNSTEP to conduct an internal quality audit and get back on track to compliance.
Woman in lab setting, logo overlay of Syn-Mar Products Inc., blue and white color scheme.
February 5, 2026
Learn how a home bathroom remodeling manufacturer partnered with CONNSTEP to use lean training to streamline operations and improve efficiency.
Logo for Wild CNC Machining Services on a blue background.
February 4, 2026
See how a manufacturer partnered with CONNSTEP to update HR policies, strengthen people practices, and support future business growth.
Show More