PodChats for FutureIoT: Understanding the fundamentals of secure IoT

Gartner observed that in the last three years, almost 20% of organizations have observed cyberattacks on IoT devices in their network.

IoT Analytics predicts that worldwide the number of connected IoT devices will grow by 9% per year, reaching 27 billion IoT connections by 2025. Riding this growth in connected devices is an increased demand for security.

Market Research predicted the global IoT security market which will grow from US$3.86 billion in 2021 to US$5.09 billion in 2022. The company says that this growth is due to companies strengthening their outputs after taking care of demand that has grown force during the COVID-19 pandemic in 2021.

While 64% of Kaspersky study respondents, Pushing the limits: How to meet the specific demands of cybersecurity and IoT protectionuse IoT solutions, as many as 43% are not fully protected.

The role of the National Institute of Standards and Technology (NIST), Recommended Criteria for Cybersecurity Labeling for Consumer Internet of Things (IoT) Products.stated that in order to reduce IoT product vulnerabilities, it is important to understand the already exploited vulnerabilities of IoT products and ensure that consumer IoT product labeling programs take these incidents into account its behavior to help improve cybersecurity in the IoT ecosystem.

Also Read :  Elevator Action Returns S-Tribute launches December 1

Dr. Dorit Dorchief product officer at Check Point Software Technologies, explains that there are many levels of IoT that leave misunderstandings and potential risks of exposure to threats from inside and outside the organization.

“Even the lowest-cost IoT device can be a starting point for an attack. You need to understand the connection of the IoT device to the internal and external world. The fact that it connects two things without ‘y right IoT controlling it is the biggest evidence of this,’ he explained.

“People are using IoT to do massive attacks (DDoS massive attacks) by taking IoTs to many locations and doing denial of service or other global destruction. These are not very focused attacks and more widespread attacks.

Dorit Dor

More common than you think

Dr Dor cautioned that attacks originating from unprotected IoT are not always targeted at specific industries. He called back the understanding that cybercriminals are always looking for the least protected targets.

That’s not to say that there are attacks specifically aimed at certain industries or organizations.

“It’s not so much a sectoral issue. It’s more of a general issue of IoT devices spreading around and kind of blocking the organization’s security architecture. By creating all these hidden link, the IoT itself can serve as a jumping point for the intended target,” he said.

Also Read :  Tech firms expand business with the VR/AR wave

Common misconceptions and challenges

Dr Dor noted that one of the biggest misconceptions when it comes to IoT security is the perception by businesses that they don’t have any IoT devices in the workplace. And if they do, another misconception is that these devices are not connected to the internal network (without their knowledge).

Another misconception, he added, is businesses thinking they are protected when they aren’t.

“People don’t always have the right personnel to do the security sections that are needed,” he said.

Advanced technologies to the rescue?

Asked if there are advanced technologies that can help solve some of the challenges he presents, Dr Dor is confident that tools are available to help in the process of understanding the challenges.

He cited the use of artificial intelligence (AI) as helping to map the devices found in the IoT device network and map their behavior.

“But to do this, you need to have a lot of data on the same IoT devices that exist,” he warned.

“So as an organization, you may not have enough data to secure your IoT devices. However, you may have enough data on the different uses and uses of these IoT devices to help you in allow or create section policies for IoT devices.”

Dorit Dor

Bringing greater security to enterprise IoT devices

Dr. Dor suggested reducing the atmosphere of access to IoT devices to the least limited or a method based on zoning. The other step is to understand what the IoT does and see that it behaves like a legitimate IoT device.

Also Read :  Essential to make process of litigation citizen centric, technology must be augmented: CJI

He recommends organizations buy IoT devices that have some security and resilience built in.

Click on the PodChat player and hear Dr Dor’s more detailed observations and recommendations for securing IoT for business.
  1. What are the IoT cyber security threats facing businesses?
  2. How common are these threats?
  3. What are the common misconceptions and challenges encountered today when businesses are trying to secure IoT devices?
  4. Can advanced technologies like AI, machine learning and deep learning solve these problems?
  5. What are the roles of AI, machine learning and deep learning in IoT security?
  6. What are your recommendations to provide greater security to business IT devices?


Leave a Reply

Your email address will not be published.

Related Articles

Back to top button