{"id":699,"date":"2018-05-24T02:01:52","date_gmt":"2018-05-23T23:01:52","guid":{"rendered":"http:\/\/kusuaks7\/?p=304"},"modified":"2021-12-21T09:05:38","modified_gmt":"2021-12-21T09:05:38","slug":"boost-built-in-iiot-security-with-vpns","status":"publish","type":"post","link":"https:\/\/www.experfy.com\/blog\/iot\/boost-built-in-iiot-security-with-vpns\/","title":{"rendered":"Boost built-in IIoT security with VPNs"},"content":{"rendered":"<p><strong><em>Ready to learn Internet of Things? <a href=\"https:\/\/www.experfy.com\/training\/courses\">Browse courses<\/a>\u00a0like\u00a0<a href=\"https:\/\/www.experfy.com\/training\/courses\/cyber-security-for-the-iot\">Cyber Security for the IoT<\/a> developed by industry thought leaders and Experfy in Harvard Innovation Lab.<\/em><\/strong><\/p>\n<p>According to Gartner, IIoT devices are\u00a0<a href=\"http:\/\/www.zdnet.com\/article\/iot-devices-will-outnumber-the-worlds-population-this-year-for-the-first-time\/\" target=\"_blank\" rel=\"noopener noreferrer\">projected to reach<\/a>\u00a03.17 billion units in 2020. This includes manufacturing field devices, process sensors for electrical generating plants and real-time location devices for healthcare. Companies taking advantage of these IP-connected business devices are already benefiting from new revenue opportunities, operational efficiencies and substantial cost savings.<\/p>\n<section id=\"download-offer\">\n<header>However, technology developments in this space are fast outpacing industry standards \u2014 earning them an unwelcome reputation for exposing sensitive data to security risks. Developments in IIoT data protection are currently failing to keep up with the rapid rate of innovation and demand. Securing the confidentiality and integrity of data passing between all these devices remains a major challenge for many businesses as IT professionals have to familiarize themselves with multiple IIoT designs, often with immature security features, that present clear data breach risks. Data from IIoT and M2M systems is especially prized by cybercriminals as they seek to intercept and sell intellectual property and personally identifiable information.<\/p>\n<\/header>\n<\/section>\n<p>Recent\u00a0<a href=\"https:\/\/www.forrester.com\/47+Of+Businesses+Say+They+Have+The+Tools+To+Support+IoT+Security+Policies\/-\/E-PRE10148\" target=\"_blank\" rel=\"noopener noreferrer\">research by Forrester<\/a>\u00a0found that the top three challenges for IT professionals are IIoT integration, migration\/installation risks and privacy concerns. In the study, 92% of C-level respondents reported that they implemented security policies for managing IoT devices, yet less than half (47%) reported that they did not have enough tools in place to enforce those policies. Undeterred, businesses are continuing to invest in IP-connected devices \u2014 49% of respondents expect to increase spending on IIoT security this year.<\/p>\n<p>While business spending on cybersecurity is projected to amount to\u00a0$134 billion by 2022, the majority of industry experts agree that\u00a0<a href=\"https:\/\/internetofthingsagenda.techtarget.com\/blog\/IoT-Agenda\/Smart-building-security-Cyber-resilience-must-be-built-in\" rel=\"noopener\">built-in security<\/a>\u00a0is the answer to establishing a trusted standard of IIoT security. Incorporating security into the initial IIoT design process will maintain the privacy and integrity of highly sensitive data from the beginning.<\/p>\n<section data-menu-title=\"Built-in security properties\">\n<h2><strong>Built-in security properties<\/strong><\/h2>\n<p>Security should never be an afterthought. Device manufacturers must adopt a security-by-design approach and build better security into the initial development of IIoT devices. Being proactive with cybersecurity practices can save a business from a widespread data breach or prevent a hacking incident that results in revenue loss and customer mistrust. The following security measures are recommended for built-in IIoT protection:<\/p>\n<ul>\n<li><strong>In-depth protection:<\/strong>\u00a0Device software should have multiple defense layers;<\/li>\n<li><strong>Automated security patching:<\/strong>\u00a0The ability to automatically patch and update IIoT device software that is in line with prevailing threat developments;<\/li>\n<li><strong>Unique hardware identity:<\/strong>\u00a0Every device should be assigned a unique identifier inextricably linked to its hardware that marks it out as trustworthy;<\/li>\n<li><strong>Independently tested trusted computing base:<\/strong>\u00a0Device operating systems and security mechanisms including access control, authorization and authentication, virus protection and data backup are verified according to recognized industry standards;<\/li>\n<li><strong>Compartmentalization:<\/strong>\u00a0Applying network security segregation within the device hardware to prevent attacks from spreading;<\/li>\n<li><strong>Software failure alerts:<\/strong>\u00a0Software failures should be automatically reported to the manufacturer; and<\/li>\n<li>\n<h2><strong>Authentication with certificates:<\/strong>\u00a0Device authentication should always use certificates rather than passwords.<\/h2>\n<\/li>\n<\/ul>\n<\/section>\n<section data-menu-title=\"Virtual private networks\">\n<h2><strong>Virtual private networks<\/strong><\/h2>\n<p>Even when the above properties are built into IIoT devices, there is one major security measure that businesses must implement. All remote connections and monitoring of IIoT devices should be secured with industry-proven encryption technology such as virtual private network (<a href=\"https:\/\/searchnetworking.techtarget.com\/definition\/virtual-private-network\" rel=\"noopener\">VPN<\/a>) software. VPNs can secure the IP-connection of every IIoT device so that data traffic is encrypted as it passes between individual devices and the remote central management point over the internet. When combined with remote access controls and certified authentication measures, VPNs form an effective barrier that shields company confidential data from the unwanted attention of unauthorized parties.<\/p>\n<p>In summary, the phenomenal growth in development and adoption of IIoT devices is rapidly outpacing manufacturers\u2019 ability to make them completely secure. In the next few years, we should see more manufacturers building best-practice security measures into devices. Though there are several recommended properties for built-in security, such as security patching and authentication with certificates, encrypting communications\u00a0<a href=\"https:\/\/www.ncp-e.com\/en\/products\/iiot\/\" target=\"_blank\" rel=\"noopener noreferrer\">with VPNs is essential<\/a>. Centrally managed VPN software provides vital data encryption for the many thousands of remote connection points that make up an IIoT environment. In combination with built-in security features and processes, VPNs provide robust protection for maintaining the privacy and integrity of\u00a0<a href=\"https:\/\/internetofthingsagenda.techtarget.com\/blog\/IoT-Agenda\/Shielding-valuable-IIoT-data-with-VPNs\" rel=\"noopener\">highly sensitive IIoT data<\/a>.<\/p>\n<\/section>\n","protected":false},"excerpt":{"rendered":"<p>Developments in IIoT data protection are currently failing to keep up with the rapid rate of innovation and demand. The top three challenges for IT professionals are IIoT integration, migration\/installation risks and privacy concerns. &nbsp;Built-in security is the answer to establishing a trusted standard of IIoT security. Centrally managed VPN software provides vital data encryption for the many thousands of remote connection points that make up an IIoT environment. In combination with built-in security features and processes, VPNs provide robust protection for maintaining the privacy and integrity of&nbsp;highly sensitive IIoT data.<\/p>\n","protected":false},"author":232,"featured_media":3748,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[195],"tags":[93],"ppma_author":[1756],"class_list":["post-699","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-iot","tag-internet-of-things"],"authors":[{"term_id":1756,"user_id":232,"is_guest":0,"slug":"julian-weinberger","display_name":"Julian Weinberger","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","user_url":"","last_name":"Weinberger","first_name":"Julian","job_title":"","description":"Julian Weinberger, Director of Systems Engineering, CISSP -&nbsp;&nbsp;<a href=\"https:\/\/www.ncp-e.com\/en\/\" target=\"_blank\" rel=\"noopener\">NCP<\/a> engineering, has over 10 years of experience in the networking and security industry, as well as expertise in SSL VPN, IPsec, PKI, and firewalls.&nbsp;"}],"_links":{"self":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/699","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/users\/232"}],"replies":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/comments?post=699"}],"version-history":[{"count":3,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/699\/revisions"}],"predecessor-version":[{"id":28464,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/699\/revisions\/28464"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media\/3748"}],"wp:attachment":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media?parent=699"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/categories?post=699"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/tags?post=699"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/ppma_author?post=699"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}