PodChats for FutureIoT: Understanding the fundamentals of secure IoT

Gartner found that in the last three years, almost 20% of companies have already experienced cyberattacks on IoT devices in their network.

IoT Analytics predictions that the number of connected IoT devices will grow at 9% per year, reaching 27 billion IoT devices by the year 2025. Riding on this growth of connected devices will necessary for safety.

ResearchandMarkets predict the global IoT security market will grow from US$ 3.86 billion in 2021 to US$ 5.09 billion in 2022. The industry attributes this growth to the fact that companies are tightening their products after meeting the demand that has grown significantly in the COVID-19 pandemic in 2021.

While 64% of Kaspersky survey respondents, Pushing the boundaries: How to address the unique cybersecurity requirements and protect IoTuse IoT solutions, as 43% do not protect them properly.

The National Institute of Standards and Technology (NIST) paper, Recommended for Cybersecurity certification for Internet of Things (IoT) customers.In order to reduce the vulnerabilities of IoT products, it is important to understand the vulnerabilities used in IoT products and ensure that the vendor of IoT product certification software considers these developments in his requirements to help improve the cybersecurity of the IoT ecosystem.

Also Read :  Facebook parent Meta prepares for large-scale layoffs this week

Dr. Dorit Dorchief product manager with Check Point Software Technologies, explains that there are many levels in IoT that leave misunderstandings and problems of identifying threats from inside and outside the company.

“The very low cost of IoT can be a starting point for the attack. You need to understand that the IoT device is connected to the inside and outside of the world. The truth is about both. without the need for IoT to control them is the biggest proof of this,” he explained.

“People use IoT to carry out massive attacks (DDoS massive attacks) by taking IoTs in many places and causing denial of service or destroying the world. these are small attacks and more attacks.”

Dorit Dor

It’s more common than you think

Dr Dor notes that attacks from the unprotected IoT are not always targeted at specific businesses. He calls attention to the fact that cybercriminals often target the most vulnerable.

That’s not to say that there are attacks that are specifically targeted at certain companies or organizations.

“It’s less of a regional problem. It’s more of a general problem of IoT devices being deployed and kind of interfering with the company’s security plan. By doing all these hidden links, it’s possible the IoT itself serves as a springboard for the intended goal,” he said.

Also Read :  Harris to announce over $13 billion in assistance to help cut energy costs this winter

Common mistakes and problems

Dr Dor noted that one of the biggest misconceptions when it comes to IoT security is the perception among businesses that they don’t have IoT devices in the workplace. And if they do, another misconception is that these things don’t apply to the local network (without their knowledge).

Another mistake, he added, is that companies think they’re protected when they’re not.

“People don’t have the right staff to do the required safety measures,” he said.

Advanced technology to the rescue?

Asked if any advanced technology would help solve some of the challenges he outlined, Dr Dor believes there are tools to help the process of understanding the problems.

He mentioned the use of artificial intelligence (AI) which is helping to map what is seen on the Internet of IoT devices and to map their behavior.

“But to do this, you need to have a lot of data on IoT devices that exist,” he said.

“So as an organization, you may not have enough data to secure your IoT devices. However, you may have enough data in different uses and using this IoT device can help for you to approve and create partition policies for IoT devices.

Dorit Dor

Bringing the security of IoT devices to business

Dr Dor recommends reducing the access space of the IoT device to a minimum or a zoning approach. The next step is to understand what the IoT does and know what the right IoT device is.

Also Read :  Atlanta Falcons Star Jake Matthews Wins the Internet With Adorable First Glimpse of His New Born Baby

He recommends that companies buy IoT devices that have built-in security and stability.

Click on the PodChat player and listen in detail to Dr Dor’s insights and advice on managing IoT for business.
  1. What are the IoT cyber security threats facing businesses?
  2. How common are these threats?
  3. What are the common misconceptions and problems encountered today when businesses try to deploy IoT devices?
  4. Can advanced technology like AI, machine learning and deep learning solve these problems?
  5. What are the roles of AI, machine learning and deep learning in IoT security?
  6. What are your tips for bringing IT software security to business?


Leave a Reply

Your email address will not be published.

Related Articles

Back to top button