It seems like yesterday when everyone was scrambling for Wi-Fi routers to create their own private networks. But, the proliferation of phones and tablets has changed everything. We started to use public networks, and we got used to expecting constant connectivity. At home, at work and anywhere in between, we expect our devices to be available at any time through any network. With businesses of all sizes generating more data than ever before (2.5 quintillion bytes every day), it’s no surprise that the Internet of Things (IoT) is under the spotlight. The new era of connected devices We’re connecting everything: vehicles, factories, home appliances and surveillance systems, along with all of the requisite sensors and controls that yield significant and undeniable benefits. Hospitals are using IoT to accelerate disease diagnosis by continuously monitoring patient activity, financial institutions are using it for better authentication and ironically “higher safety”, and automotive companies are using it to track telematics. But these new devices also come new challenges in the war against cybercrime. IoT, a blessing in disguise The Internet of Things promises to give us more convenience and ease of use, but the increase in connected devices also means increased and more complex attack surfaces that are a lot harder to control and threaten our security and privacy. Every connected device poses a risk. In north America, attackers used a connected fish-tank thermometer to get a foothold in the network of casino. Monitoring IoT cybersecurity risk is no longer enough. These devices are often shipped with default passwords that are never changed by the user, which leaves them open to be accessed by anyone with malicious intent. An attacker can gain access through the open ports and monitor the traffic that passes through the devices. If they see something of interest, they can then compromise that device or pivot into another part of your network just like in the case of the casino until reaching more critical assets. Best practices to mitigate IoT risks To successfully secure IoT devices, there are several best practices you should be looking at:
Gearing up for the shifting battlefield In the face of rising network complexity and risk, the first thing corporations need, is to put in place is a policy around IoT usage and adoption. The next and often most challenging step is regaining control of the attack surface; visualise and understand what devices are exposed and how they could lead to critical assets within a network. It is what the team at Oxyde Technologies has heavily devoted itself to. By leveraging the power of AI, Oxyde’s flagship product ‘Zion’ enables organisations to regain full control of their attack surface through discovering and eliminating critical security risks before they can be exploited by a malicious actor. It maps out every device in a network, identifies vulnerabilities and validates them through exploitation so that they can be prioritised based on:
Stay ahead of hackers by taking the leap towards a more proactive and results driven cybersecurity assessments and start validating your security now. Andrew Law
COO of Oxyde Technologies.
0 Comments
Your comment will be posted after it is approved.
Leave a Reply. |