paint-brush
Enterprise IoT Could Open Up Worrisome Attack Vectors by@sadie-williamson
624 reads
624 reads

Enterprise IoT Could Open Up Worrisome Attack Vectors

by Sadie WilliamsonSeptember 10th, 2019
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

Gartner estimates that 14.2 billion connected devices will be in use this year. By 2021, the number is expected to reach 25 billion. Given its varied use cases, enterprise IoT can open up some worrisome vectors of attacks that cybercriminals can exploit. Among the potential attacks against enterprise infrastructure may include: Denial of Service, Espionage and Sabotage. Cybersecurity experts say businesses keen on adopting IoT must adjust their respective security strategies to accommodate IoT as potential vector for attacks.

Companies Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - Enterprise IoT Could Open Up Worrisome Attack Vectors
Sadie Williamson HackerNoon profile picture
The days of “dumb” analog devices are at an end. These days, everything has to be “smart” and a part of the Internet-of-Things (IoT).

Digital devices are now designed to connect and communicate with each other and be controllable remotely using smart phones. Enterprises are all jumping on the bandwagon, installing smart lights for their offices and
using connected sensors and robots in their factories.

Research firm Gartner estimates that will be in use this year. By 2021, the number is expected to reach 25 billion. However, this increasing rate of adoption is only giving rise to more cybersecurity concerns. Given its varied use cases, enterprise IoT can open up some worrisome vectors of attacks that cybercriminals can
exploit.

In its , Bulletproof cited that the popularity of smart appliances has contributed to the growing risks of attacks like data
harvesting. IoT security provider FirstPoint also identified that hackers are nowcapable of launching to disrupt IoT devices that rely on such signals to transmit and stream their data. And, even today, security firm Imperva has found that the notorious IoT-reliant Mirai malware is still actively being used to carry out massive .

Organizations keen on adopting IoT must understand the cybersecurity risks that the technology may bring. This
way, they can adjust their respective security strategies to accommodate IoT as potential vector for attacks.

as part of cyberwarfare. Attacks on large enterprises can be
significant enough to affect the economy.

It isn’t just state-sponsored attackers that may try to cause disruption to enterprises. Unscrupulous competitors may also resort to espionage or sabotage in order to gain an advantage over rivals. But regardless of the entities behind the attacks, IoT devices are now also being exploited for these reasons.

Protection

Fortunately, there are various ways to mitigate IoT-focused attacks. These include: Adopting cellular network-based security. An emerging approach to enterprise IoT security is a cellular-based approach. Security providers can integrate with the mobile network operator's systems and create secure virtual networks. All communication from IoT devices are encrypted and routed through these networks where algorithms screen for and block threats.

Investing in secure devices - Part of the reason why malware have
easily spread across is due to the proliferation of low-cost devices in the
market. These devices, unfortunately, lack the necessary security features to prevent malware and hackers from hijacking them. Companies may be tempted to go cheap and opt for such devices. But, it would be wise for them to invest in devices that can be secured from manufacturers that provide sustained support.

Applying stringent access management - Poor access management has
also allowed attackers to easily hijack devices. Users often leave devices
running using default access credentials. Attackers have tools and automated scripts that can readily take over such devices. These can be prevented by using secure credentials and avoiding password reuse.

Comprehensive data protection - Organizations must also ensure that the ways they retrieve and store data coming from IoT devices are kept secure. Security solutions such as breach prevention services are now available to comprehensively protect devices and servers against malicious traffic and hacking attempts.

Proceeding with Caution

Given how IoT has become the next big thing, it’s inevitable for more enterprises to try and take advantage of the hype. They should, however, be aware that investing in cutting edge technologies come with plenty of caveats and threats of cyberattacks are just among these risks. This said, these issues shouldn't entirely discourage companies from IoT. Connected devices have shown to benefit users including cost savings through efficient and automated operations and game-changing insights from big data generated by IoT. What is key is for companies to formulate strategies to mitigate IoT attacks and strengthen their security measures. This way, they can still enjoy the benefits of IoT adoption while minimizing their exposure to attacks.
바카라사이트 바카라사이트 온라인바카라