A recent survey of over 400 global IT security pros revealed that fears over the security of connected devices has risen sharply since last year. 86% of respondents to security analysts Pwnie Express' survey said they were worried about device threats - with 50% either 'very' or 'extremely' concerned. Many had even witnessed attacks first-hand.
[...]
To combat the threat of the 'evil Internet of Things', much needs to be done, at both an individual or company level, and at a broader industry level.
• Hard-wiring security into every device: IoT manufacturers and vendors need to consider the evolving nature of security in their product development from the outset. Achieving IoT security from the ground up involves ensuring the rigorous encryption is ‘baked’ into the devices themselves.
• Taking responsibility: Organisations embedding and allowing connected devices onto their networks must develop strong controls to ensure no weak links in the chain. This could include ‘bring your own device’ policies to manage mobile devices and wearables in the workplace, thorough analysis and testing of any IoT vendor they’re using, and information security policies to manage the protection of sensitive data.
• Achieving standardisation: Many current machine-to-machine protocols were designed to be fast and efficient on local closed-loop networks. Now that we’re connecting many of these devices to the open-loop IP standard, their vulnerabilities are becoming clear. In the modern, connected world, the devices need to comply with the established security protocols to ensure they can be safely patched into the global internet.
• Focus on the information that’s being secured: As individuals, we’re generally comfortable with vast amounts of personal data stored with ecosystems managed by the likes of Apple, Google and Facebook. As businesses, we need to adopt the same diligence as these digital leaders, in focusing on the protection of personal data from employees, customers, partners, and other stakeholders.
• Threat detection and early response: The threat landscape is in a never-ceasing state of evolution. So with all these other practices in place, attacks are still possible. It’s essential for organisations to develop the instrumentation to quickly spot any attacks, and minimise the damage.
[...]
See more at: bizcommunity.com
Blog Archive
-
▼
2016
(124)
-
▼
June
(64)
- Amazon, Google and Volvo Want to Seamlessly Integr...
- BlackBerry's Radar, Internet of things meets truck...
- What’s being done to improve security for the Inte...
- How the Internet of Things can lead to cleaner, li...
- Internet of Things mushrooms in Chicago thanks to ...
- Internet of Things to reach 25 billion devices wit...
- 5G will have a profound effect on the Internet of ...
- The Internet of Things is facing challenges with s...
- Here's how the Internet of Things will explode by ...
- What's Next for the Internet of Things (IoT) in Pe...
- Fulfilling the Promise of the Internet of Things
- Samsung Shows Dedication to IoT with $1.2 Billion ...
- Here's A Whiff of the Future for the Internet of T...
- Samsung Electronics says to invest $1.2 billion in...
- Internet of things: 4 free platforms to build IoT ...
- Salem-based company builds connectivity for the In...
- Internet of Things Vulnerable in a Connected World
- Four Areas of Security Vulnerabilities Presented B...
- IBM Launches New Initiatives to Advance Developer ...
- Make sure the Internet of Things isn’t a route for...
- Let’s make Ireland the world’s internet of things ...
- US Department of Homeland Security awards Factom f...
- List of Books on Internet of Things
- 10 Predictions for the Future of IoT
- Combatting the evil Internet of Things
- Product or Service? Making wise decisions with th...
- Internet Of Things: Where Is All The Data Going?
- The Consumer Internet of Things is About to Explode
- 5 challenges to Internet of Things
- The Internet of Things Is Too Confusing
- NSA Looking to Exploit Internet of Things, Includi...
- Protecting Trade Secrets in the New Industrial Age...
- Nokia : Smart Home solution connects residential c...
- U.S. Gov't: The Internet of Things Is A Security D...
- Internet of things: Closing security gaps in inter...
- The Internet of Things that Really Matter
- Copyright, the Internet of Things, and the End of ...
- Inspiring the Internet of Things Generation
- The Internet of Things Is Turning Into the Interne...
- Who is the Administrator of Things in Your Home?
- Understanding the Insecurity Surrounding Connected...
- HIT Think How the Internet of Things will disrupt ...
- How the Internet of Things is set to revolutionise...
- U.S. gets warnings and advice about the Internet o...
- The Internet of Things (IoT) and Analytics at The ...
- Internet of Things is here: But what about Securit...
- Tech Giants Take the Stage to Discuss the Internet...
- The Internet of Things has a child privacy problem
- Finland to deploy national Sigfox IoT network
- Internet of Things: Five truths you need to know t...
- Who Will Control The Internet Of Things?
- How ready is the Internet for IoT?
- Travel and the Internet of Things – IoT set to tak...
- The Internet of Things Is Not for You
- Cisco CEO Robbins: Connected devices will be growi...
- Voice Control Will Make the Internet of Things Ver...
- Ericsson: Internet of Things to surpass mobile lin...
- Someone forgot to tell Microsoft and Nokia that th...
- IBM and Cisco Partner Up On Internet Of Things
- The Internet of Things is coming to your school
- Are Internet-of-Things Devices Really that Easy to...
- Why gaze tracking startup Cogisen is eyeing the In...
- Uh, so, what exactly is the Internet of Things?
- One chip to rule them all? The Internet of Things ...
-
▼
June
(64)
Advertisement
Powered by Blogger.
No comments:
Post a Comment