https://www.iotworldtoday.com/wp-content/themes/ioti_child/assets/images/logo/mobile-logo.png
  • Home
  • News
    • Back
    • Roundups
  • Strategy
  • Special Reports
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Podcasts
    • Strategic Partners
    • Latest videos
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Editorial Submissions
  • Events
    • Back
    • Embedded IoT World (Part of DesignCon) 2022
Iot World Today
  • NEWSLETTER
  • Home
  • News
    • Back
    • Roundups
  • Strategy
  • Special Reports
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Podcasts
    • Strategic Partners
    • Latest videos
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Editorial Submissions
  • Events
    • Back
    • Embedded IoT World (Part of DesignCon) 2022
  • newsletter
  • IIoT
  • Cities
  • Energy
  • Homes/Buildings
  • Transportation/Logistics
  • Connected Health Care
  • Retail
  • AI
  • Metaverse
  • Development
  • Security
ioti.com

Security


Thinkstock

The hackers are coming.

4 Ways to Secure Your Network in an IoT Era

A hacker who breaks into a modern enterprise environment is like the proverbial fox in a henhouse—thanks in part to the Internet of Things.
  • Written by Ofer Amitai
  • 19th April 2017

The modern enterprise environment is teeming with not just laptops and smartphones but also IoT devices like security cameras and even smart coffee pots. The even-expanding numbers of devices lead to massive vulnerabilities for corporate networks.

To a potential attacker, IoT devices are especially attractive targets. Many of these devices have an inherent value by the simple nature of their function. A connected security camera, for example, can provide valuable information about the security posture of a given location when compromised.

For example, in late 2016 there was a massive DDoS attack that knocked prominent websites like Amazon, Netflix, and Reddit offline. This malware leveraged an army of internet-connected devices—such as printers, IP cameras, residential gateways, and baby monitors infected with the Mirai virus. This example, though extreme, shows the potential vulnerabilities unknown and unmanaged IoT devices can cause a network.

How Common Is It to Have Unknown Networked Devices?

With BYOD and IoT, the number of devices that enter the enterprise network on a daily and even hourly basis is increasing dramatically. It is nearly impossible to keep track of them. Without visibility into a network, it is hard to “know” all the connected devices in a network. The first step to identifying vulnerabilities brought by IoT devices is understanding all of the devices on the network.

Without network visibility, it’s impossible to control and secure all devices and without knowing what devices are on the network, the risk of getting breached increases. Whether it be the time-attendance controller that someone connected four years ago, the TV in the conference room, or the temperature gauge in the floor switch room, these devices are often vulnerable to attacks. To minimize risks, any devices connected to the enterprise network should be patched with updated security software.

To prevent your organization from becoming a victim of an IoT attack, use the following steps to identify and secure your network:

1. Assess All Devices in Your Network.
Implement a network discovery process for existing IoT devices including managed and partially managed devices. Make sure you understand the type of all of those devices, which operating systems are running on them, and which application and processes are installed on them.

2. Segment Your Valuable Data.
IoT devices should be on a separate network segment from devices such as laptops, PCs, or smartphones. They should also not be within reach of the organization’s mission critical systems or data. Firewalls must be deployed between these segments to prevent IoT devices from reaching your network’s “crown jewels.” By performing proper segmentation, you enhance the ROI of your existing detection technology by making it more accurate and effective.

3. Immediately Detect New Devices.
Make sure you have the ability to detect every IoT device that joins the network immediately. After that, carefully verify whether it behaves similarly to other typical devices. A compromised device or a fake device might look the same but will behave differently.

4. Deploy an Immediate Response.
Once a breach is discovered, it is poor practice for an alert to be sent and then processed manually. Manual actions take time—hours or even days (a weekend breach for example) and can be costly. An automated breach response is required to block a particular device or limit its access within seconds. Network Access Control (NAC) tools are one way to achieve this.

Based on recent attacks, attackers will continue to take advantage of vulnerabilities in IoT devices. We can expect to see hackers becoming more and more creative with the IoT devices they target. Starting with full network visibility to identify devices on the network, followed by a layered approach to securing these devices and responding to a potential breach, your vulnerable information is protected, and you can avoid having your enterprise make unexpected headlines.

 

Tags: Article Security Technologies

Related


  • IoT Security Firm to Acquire Medical Security Startup
    Claroty is set to acquire Medigate to grow its foothold in securing the Internet of Medical Things
  • Ransomware Attack Could Impact Paychecks
    The Kronos ransomware attack affected the company’s private cloud service over the weekend, knocking it offline just before the holidays
  • Image shows an abstract digital big data concept.
    BotenaGo Malware Targets Millions of IoT Devices
    AT&T Alien Labs identified the malware that has left millions of IoT devices exposed.
  • IoT Startup Raises $10M
    Platform aims to bolster network security with automated device configurations and visibility.

Leave a comment Cancel reply

-or-

Log in with your IoT World Today account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Related Content

  • IoT Device Security at the Edge Poses Unique Challenges
  • Zero-Trust Security for IoT: Establishing Rigorous Device Defenses
  • AI Ups the Ante for IoT Cybersecurity
  • Protecting Your Network Against Ripple20 Vulnerabilities

Roundups

View all

IoT Product Roundup: PTC, Nokia, Arm and More

19th May 2022

IoT Deals, Partnerships Roundup: Intel, Nauto, Helium and more

14th May 2022

IoT Product Roundup: Amazon, Synaptics, Urban Control and More

27th April 2022

White Papers

View all

The Role of Manufacturing Technology in Continuous Improvement Ebook

6th April 2022

IIoT Platform Trends for Manufacturing in 2022

6th April 2022

Latest Videos

View all
Dylan Kennedy of EMQ

Embedded IoT World 2022: Dylan Kennedy of EMQ

Dylan Kennedy, EMQ’s VP of global operations, sat down with Chuck Martin at Embedded IoT World 2022.

Embedded IoT World 2022: Omdia’s Sang Oh Talks Vehicle Chip Shortage

Omdia’s automotive semiconductor analyst sits down with Chuck Martin at this year’s event

E-books

View all

How Remote Access Helps Enterprises Improve IT Service and Employee Satisfaction

12th January 2022

An Integrated Approach to IoT Security

6th November 2020

Webinars

View all

Rethinking the Database in the IoT Era

18th May 2022

Jumpstarting Industrial IoT solutions with an edge data management platform

12th May 2022

AI led Digital Transformation of Manufacturing: Time is NOW

9th December 2021

Special Reports

View all

Omdia’s Smart Home Market Dynamics Report

7th January 2022

Cybersecurity Protection Increasingly Depends on Machine Learning

28th October 2020

IoT Security Best Practices for Industry and Enterprise

20th October 2020

Twitter

IoTWorldToday, IoTWorldSeries

Clearview AI has been fined $9.4 million for collecting images of people from social media platforms to add to its… twitter.com/i/web/status/1…

24th May 2022
IoTWorldToday, IoTWorldSeries

Swiss-startup Airyacht is developing an eponymously named vehicle that it says will take the luxury-yacht experienc… twitter.com/i/web/status/1…

23rd May 2022
IoTWorldToday, IoTWorldSeries

@Tesla’s #Autopilot being investigated once again following fatal crash in Newport Beach, California. iotworldtoday.com/2022/05/23/tes…

23rd May 2022
IoTWorldToday, IoTWorldSeries

A new Kansas law will enable #driverless deliveries from @Walmart and its partner @Gatik_AI. #AVs… twitter.com/i/web/status/1…

23rd May 2022
IoTWorldToday, IoTWorldSeries

Access a world of opportunity in 2022 with @IoTWorldToday ➡️ Now is time to unlock ROI, by accessing a global com… twitter.com/i/web/status/1…

23rd May 2022
IoTWorldToday, IoTWorldSeries

3D Home Printer to Build 72 Residences for National Homebuilder dlvr.it/SQhWSF https://t.co/XJOs70DqzH

19th May 2022
IoTWorldToday, IoTWorldSeries

Microsoft Ramping up Cybersecurity Service Offerings dlvr.it/SQhPR0 https://t.co/nYzaDRnyVY

19th May 2022
IoTWorldToday, IoTWorldSeries

IoT Product Roundup: PTC, Nokia, Arm and More dlvr.it/SQhNNF https://t.co/ZApdw3RHdu

19th May 2022

Newsletter

Sign up for IoT World Today newsletters: vertical industry coverage on Tuesdays and horizontal tech coverage on Thursdays.

Special Reports

Our Special Reports take an in-depth look at key topics within the IoT space. Download our latest reports.

Business Resources

Find the latest white papers and other resources from selected vendors.

Media Kit and Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • IoT World Series
  • Channel Futures
  • RISC-V
  • Dark Reading
  • ITPro Today
  • Web Hosting Talk

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Login/Register

FOLLOW IoT World Today ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookies Policy
  • Terms
Copyright © 2022 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X