{"id":1368,"date":"2019-02-15T10:32:06","date_gmt":"2019-02-15T10:32:06","guid":{"rendered":"http:\/\/kusuaks7\/?p=973"},"modified":"2023-08-07T12:31:56","modified_gmt":"2023-08-07T12:31:56","slug":"businesses-need-to-get-serious-when-it-comes-to-iot-security","status":"publish","type":"post","link":"https:\/\/www.experfy.com\/blog\/iot\/businesses-need-to-get-serious-when-it-comes-to-iot-security\/","title":{"rendered":"Businesses Need to Get Serious When It Comes to IoT Security"},"content":{"rendered":"<p><strong><em>Ready to learn Internet of Things? <a href=\"https:\/\/www.experfy.com\/training\/courses\">Browse courses<\/a>\u00a0like\u00a0<a href=\"https:\/\/www.experfy.com\/training\/courses\/cyber-security-for-the-iot\">Cyber Security for the IoT<\/a> developed by industry thought leaders and Experfy in Harvard Innovation Lab.\u00a0<\/em><\/strong><\/p>\n<p>The emergence of IoT or the Internet of Things introduced plenty of new opportunities for businesses everywhere. Suddenly, you can connect just about anything to tap into advanced analytics, more concise data and actionable insights. Unfortunately, it turns out that linking everything up to the open internet and public networks \u2014 even devices that traditionally wouldn\u2019t be \u2014 causes quite a bit of fuss for cybersecurity.<\/p>\n<p>For an enterprise, especially, the more IoT and connected devices that t<a name=\"_GoBack\"><\/a>ap into a network translates to fewer controls. It\u2019s difficult to identify the devices connecting to the network, which makes it even harder to discern what users or apps do with them.<\/p>\n<h2><strong>How Serious Is the Problem?<\/strong><\/h2>\n<p>A Forrester Consulting survey reveals how unprepared modern businesses are to deal with this problem. Out of 603 IT and line-of-business decision-makers involved with cybersecurity teams, <a href=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2017\/11\/Forrester-Survey-Fail-To-Plan.pdf\" rel=\"noopener\">82 percent of companies<\/a> say they are not confident they can pass audits simply because they cannot identify all IoT or OT devices connected to their network(s). And it\u2019s not just companies in the U.S. either \u2014 the survey included those from Australia, New Zealand, France, UK and Germany.<\/p>\n<p>It\u2019s a vast and remarkably widespread problem that touches on the entire business and enterprise sector as a whole. B2B, ecommerce and conventional retail companies are included in the adoption of IoT as well. Brick-and-mortar retailers, for example, <a href=\"http:\/\/www.reflexisinc.com\/enabling-real-time-retail-internet-things\/\" rel=\"noopener\">utilize IoT to improve their stores<\/a> and offer more streamlined services for consumers.<\/p>\n<p>The survey also went on to ask who should be responsible for the security of said untamed and unidentified devices. None of the respondents had a clear answer or solution \u2014 IoT is essentially the Wild West of modern technology.<\/p>\n<p>To protect a network and the flows of data \u2014 incoming or outgoing \u2014 an IT and security team must have precise details about who and what enters the network. When coupled with BYOD environments, it becomes even more important.<\/p>\n<p>Many security tools allow for and require proper identification so malicious parties and devices can either be blocked or removed from the network entirely. This stops unauthorized intrusions, potential data breaches and worse from occurring over an extended period of time. Furthermore, it\u2019s vital to regaining a foothold and control over the network in the event of a major attack.<\/p>\n<h2><strong>What\u2019s the Solution?<\/strong><\/h2>\n<p>There\u2019s no single or straightforward answer for solving the major security issues with IoT, but that doesn\u2019t mean it\u2019s impossible to achieve.<\/p>\n<p>To start, we need to focus on improving the security for IoT altogether. Many devices \u2014 especially portable \u2014 have lax security in place which makes them ripe for the picking. The more vulnerable the device, the more likely bad actors will target it. This lies outside the scope of enterprise and business IT teams, however. It\u2019s more of a responsibility for the entire technology industry and device manufacturers to handle. Still, it\u2019s something that needs doing, even to help protect consumer data too.<\/p>\n<p>As for device discovery and identification, automation and sophisticated machine learning algorithms are the most approachable answers. Manually vetting and registering the details of every device that connects to the network is not just tedious, it\u2019s impossible even for the largest of IT support teams. It only makes sense to automate the process, but it can be improved to pick up on unauthorized parties and devices. This can effectively be referred to as dynamic IoT device discovery and profiling. But for it to work, you need <a href=\"https:\/\/arxiv.org\/abs\/1801.06275\" rel=\"noopener\">a real-time monitoring and data processing system<\/a> in place, which is no small feat.<\/p>\n<p>The system must review not just the users and devices, but what they do after accessing the network, where they go, how often they connect \u2014 or how long they stay \u2014 and whether or not they remain within the boundaries of their permissions. Using this information, it must then take action and send alerts to IT professionals for review.<\/p>\n<p>Someone unauthorized, for instance, tapping into a portion of the network and attempting to access encrypted, sensitive data they shouldn\u2019t view must be restricted or blocked entirely. And the system should have the knowledge and ability to do this as soon as it discovers a problem, no questions asked.<\/p>\n<p>The good news is that many tools like this exist, and are continuously updated and improved to become more precise, reliable and efficient.<\/p>\n<p>As for you \u2014 a business owner, executive, or IT professional working in the industry \u2014 it\u2019s time you get serious about the problem and come up with some ways to bolster your own security before IoT becomes Pandora\u2019s box. Deploying a real-time monitoring solution with the backup of a machine learning or AI platform is a great start.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There&rsquo;s no single or straightforward answer for solving the major security issues with IoT, but that doesn&rsquo;t mean it&rsquo;s impossible to achieve. To start, we need to focus on improving the security for IoT altogether. As for you &mdash; a business owner, executive, or IT professional working in the industry &mdash; it&rsquo;s time you get serious about the problem and come up with some ways to bolster your own security before it becomes a Pandora&rsquo;s box. Deploying a real-time monitoring solution to the backup of a machine learning or an AI platform is a great start.<\/p>\n","protected":false},"author":217,"featured_media":3141,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[195],"tags":[93],"ppma_author":[1745],"class_list":["post-1368","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-iot","tag-internet-of-things"],"authors":[{"term_id":1745,"user_id":217,"is_guest":0,"slug":"nathan-sykes","display_name":"Nathan Sykes","avatar_url":"https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/04\/medium_5b077b8d-d190-4522-a96a-8144badf183b-150x150.jpg","user_url":"https:\/\/www.findinganoutlet.com\/","last_name":"Sykes","first_name":"Nathan","job_title":"","description":"Nathan Sykes is founder and editor of\u00a0\u00a0<a href=\"http:\/\/go.toutapp.com\/cd2cb75f51bb2db143\" target=\"_blank\" rel=\"noopener\">Finding an Outlet<\/a>, a platform for the latest news and trends in business technology.\u00a0"}],"_links":{"self":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/1368","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/users\/217"}],"replies":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/comments?post=1368"}],"version-history":[{"count":3,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/1368\/revisions"}],"predecessor-version":[{"id":29455,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/1368\/revisions\/29455"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media\/3141"}],"wp:attachment":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media?parent=1368"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/categories?post=1368"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/tags?post=1368"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/ppma_author?post=1368"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}