Part: 2 Cyber Security Small Business Lessons from the Nissan Leaf

small business cyber security lessons

The Internet of Things (IoT) Cyber Security and Unfettered Nissan Leaf


Editors note: This is part two of two Small business owners and IT executives should understand the underlying issues surrounding these events including the potential legal and data protection consequences of exposed endpoint devices and encryption backdoors. Part one of the piece is entitled Small Businesses Owners Beware, Cyber Security Is Under Attack

Wikipedia defines the Internet of Things (IoT) as: the network of physical objects—devices, vehicles, buildings and other items—embedded with electronics, software, sensors, and network connectivity that enables these objects to collect and exchange data.

Data protection consequences of exposed endpoint devices and encryption backdoors.

IoT Unfettered for the Nissan Leaf

A security researcher demonstrated that communications between Nissan’s smartphone app and its Leaf electric vehicles could be replicated over the Web.

This is because the connection is unauthenticated and requires only knowledge of the vehicle’s personal VIN. The Nissan app, called Nissan Connect EV, can control a car’s climate controls and the monitor the status of the driving range.

Further investigation proved that trip-related data including frequency and distance could also be obtained via unprotected API access queries to the car. Because VINs are displayed in the windshield, a hacker could potentially use these exploits with relative ease.

Nissan was first alerted to these issues on January 23 and is reportedly working on a solution to these issues though none have yet been implemented. The company had removed its app from app stores while it works on a solution and concerned customers should disconnect their cars from app access as a means of preventing tampering.


While the FBI would like us to believe that the implications of a judgment forcing Apple to assist in obtaining access from one or a small number of iPhones is not far reaching, it would set a dangerous and obvious precedent.

Should the federal government force Apple to break iPhone encryption, the very nature of encryption could easily be broken as the government could force backdoors into any and potentially all technologies essentially rendering security useless.

No entity, be it a federal government or anyone else, is effectively able to wholly protect their secrets and unfettered such backdoor access would undoubtedly become the most sought after information by hackers, foreign governments, and competitors.

Once those exploits get loose – and they inevitably would within a short period of time – there would be no way to put the genie back in the bottle. Essentially, security as we know it – however flawed and imperfect it may be – would be a thing of the past.

Access into the insecure Nissan Leaf systems (essentially an IoT device on wheels) demonstrates the concerns facing the burgeoning space.

IoT – and other endpoint devise – developers may be working under some patently false pretenses encouraging them to sidestep enterprise security policies and those need to be put to rest immediately.

Executives must ensure all endpoints are protected and put in policies that address fallacies.

Next- Here are four of the most prevalent fallacies.


“I Don’t Like My Increase!”

“I Don’t Like My Increase!”

3 business owner tips on how to deliver base pay messages By now, your company has likely completed its merit cycle, and the responsibility of delivering the merit increase to your employees falls on your shoulders. These communication tips can serve as your guide to...

Video Gallery


Sign Up for the Latin Biz Today Newsletter

PR Newswire

Featured Authors

Innovation & Strategy










Work & Life


Health & Fitness

Travel & Destinations

Personal Blogs

Pin It on Pinterest