How Organizations can secure their IoT Devices

How Organizations can secure their IoT Devices

In 2021, it was estimated that there were 10 billion connected IoT (Internet of Things) devices. Sensors, networked security cameras, microphones – Internet of Things devices are used by organizations around the world. According to an Omdia survey, 90 percent of enterprises say IoT devices are central to their digital transformation.

The widespread use of IoT devices can come at a cost. Keeping these devices secure is not often a primary focus when organizations deploy these tools, leaving them vulnerable to security risks. Attackers can use unprotected IoT devices as a launchpad to infiltrate corporate networks. With this in mind, there are steps that should be taken by organizations to protect their IoT devices, and their data.

IoT devices typically collect data and send it on for collection and analysis. IoT devices are usually smaller, compact devices, which means they often times don’t have a large storage capacity. Because of their low storage capacity, they’re prevented from using security tools such as anti-malware software and firewalls. Patching these devices can be a challenge, therefore these vulnerabilities are not remediated – making IoT devices a weak link in the security chain.

To make problems worse, IoT networks have grown over time to incorporate several devices in uncontrolled and unsecured environments. IoT networks can be complex, and they present a much larger attack area than a normal network. With so many connections on one network, the risk runs just as high. Even a minor vulnerability on one single device and present danger for the entire network.

So what steps can IT leaders take to secure the IoT devices in their network? Following these steps can help:

Know what you have

A 2020 Infoblox study found that 80 percent of IT professionals over a 12-month period discovered unknown IoT devices on their network. Make sure your IT team takes stock of all of the devices on your network. IoT device management platforms can help with visibility into their entire inventory and can help your team spot potential security issues. These platforms can also help identify and profile all devices and monitor them regularly.

Choose the right devices

Your organization should only use IoT devices designed with effective security features from manufacturers who release timely security updates. Avoid devices without external interfaces or with unchangeable credentials. IT teams should also turn off any unneeded features such as microphones and ports.

Secure device access

Your organization’s IT professionals should change default credentials when installing an IoT device. They should also avoid the reuse of the same credentials across multiple similar devices.

Secure the data

Encrypting your data protects it from being accessed or stolen by unauthorized users. Encrypt your data to prevent eavesdropping or the theft of your organizations sensitive information.

Patch your devices

When manufacturers release security updates for a discovered vulnerability, your IT team needs to make sure the devices are being updated immediately. Waiting even a day or two gives attackers the time they need to exploit a vulnerability.

IoT networks are a game changer, because of their convenience and functionality. But IT teams need to make sure these networks aren’t vulnerable to security attacks. There is more organizations can do to protect their IoT networks such as network segmentation, monitoring and analyzing network traffic. But following the steps outlined above is a great way to begin addressing the most common security risks.

 

Story via BizTech Magazine

The “Disturbing Trend” in Software Patches – and how it’s being addressed

The “Disturbing Trend” in Software Patches – and how it’s being addressed

These are the most Impersonated Apps used in Malware Attacks

These are the most Impersonated Apps used in Malware Attacks