{"id":774,"date":"2018-07-03T05:49:27","date_gmt":"2018-07-03T02:49:27","guid":{"rendered":"http:\/\/kusuaks7\/?p=379"},"modified":"2025-11-21T08:45:44","modified_gmt":"2025-11-21T08:45:44","slug":"five-best-practices-to-reduce-the-risk-of-a-successful-iot-cyberattack","status":"publish","type":"post","link":"https:\/\/www.experfy.com\/blog\/iot\/five-best-practices-to-reduce-the-risk-of-a-successful-iot-cyberattack\/","title":{"rendered":"Five Best Practices to Reduce the Risk of a Successful IoT Cyberattack"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"774\" class=\"elementor elementor-774\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-528a8b30 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"528a8b30\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6478a120\" data-id=\"6478a120\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f345ed elementor-widget elementor-widget-text-editor\" data-id=\"f345ed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<strong><em>Ready to learn Cybersecurity? <a href=\"https:\/\/www.experfy.com\/training\/courses\">Browse courses<\/a>\u00a0like\u00a0<a href=\"https:\/\/www.experfy.com\/training\/courses\/cyber-security-for-the-iot\">Cyber Security for the IoT<\/a> developed by industry thought leaders and Experfy in Harvard Innovation Lab.<\/em><\/strong>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-57f01be elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"57f01be\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3164b8d\" data-id=\"3164b8d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bb0e3f2 elementor-widget elementor-widget-text-editor\" data-id=\"bb0e3f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tHaving seen the damage caused by recent ransomware, malware and other cyber attacks, like last year\u2019s WannaCry attack, enterprises are moving cyber security and resiliency to the top of their priority lists (if they were not there already). This is especially true for enterprises building or managing IoT applications. Attacks like the Mirai botnet attack in 2016 \u2013 which used IoT devices to launch distributed denial of service attacks (DDoS) \u2013 are raising both consumer and business customers\u2019 fears regarding the security of the IoT.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-9cd83e1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9cd83e1\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b7fcc3b\" data-id=\"b7fcc3b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7544ac0 elementor-widget elementor-widget-text-editor\" data-id=\"7544ac0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tWhen it comes to cybersecurity, IoT devices are very similar to other internet-connected devices, but also come with their own unique security challenges. For example, IoT devices are often physically located in remote or unsecure places beyond the normal IT security perimeter, making them more vulnerable to tampering than many other internet-connected devices. Many IoT devices are also designed for long lifecycles (up to 15 years), which means they can become increasingly vulnerable over time if they are not updated with new firmware. In addition to these physical and firmware update challenges, IoT devices are frequently designed to run unattended with little user interaction. This can make it harder to detect a successful intrusion as, outwardly, everything about the device might appear to be fine.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-a6e4466 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a6e4466\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-51c9d75\" data-id=\"51c9d75\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ddb5084 elementor-widget elementor-widget-text-editor\" data-id=\"ddb5084\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tOne way to address these unique challenges is to only use IoT solutions that come with high levels of built-in security. However, even the strongest safe will not stop a robber if the owner forgets to the lock it, and even the most secure IoT solutions are vulnerable if enterprises do not follow both general cybersecurity best practices, as well as other best practices that address the specific security challenges of the IoT. While not comprehensive (one could fill a book with all the techniques that can be used to make an IoT application more secure), here are five key best practices enterprises can adopt to significantly lower the risk of a successful attack on their IoT infrastructure.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-b83c0c2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b83c0c2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-545331c\" data-id=\"545331c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5d88d50 elementor-widget elementor-widget-heading\" data-id=\"5d88d50\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><h3>Create Strong Passwords<\/h3><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-dc11fcf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"dc11fcf\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f88f5ce\" data-id=\"f88f5ce\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e27742c elementor-widget elementor-widget-text-editor\" data-id=\"e27742c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tWhile not unique to the IoT, given its importance it bears repeating that, as with any internet connected device, enterprises should ensure that all of their IoT devices are configured with strong, unique passwords. According to the annual\u00a0<a href=\"https:\/\/www.infoworld.com\/article\/3193028\/security\/annual-verizon-security-report-says-sloppiness-causes-most-data-breaches.html\" target=\"_blank\" rel=\"noopener noreferrer\" class=\"broken_link\">2017 Verizon Data Breach Investigations Report<\/a>, 81 percent of hacking-related breaches succeeded through stolen or weak passwords. Yet many enterprises continue to use the default passwords that came with their devices, or, in cases where the device makes them create a new password, use basic ones \u2013 such as \u201cpassword\u201d or \u201c123456.\u201d To learn more about how to create strong passwords, enterprises should look to experts such as the\u00a0<a href=\"https:\/\/www.nist.gov\/\" target=\"_blank\" rel=\"noopener noreferrer\">National Institute of Standards and Technology<\/a>.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-397f227 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"397f227\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-183a0d2\" data-id=\"183a0d2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-543b2af elementor-widget elementor-widget-heading\" data-id=\"543b2af\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h3>Update Device Firmware<\/h3><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-48fe02d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"48fe02d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-acff55d\" data-id=\"acff55d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-eb05bd7 elementor-widget elementor-widget-text-editor\" data-id=\"eb05bd7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIoT device vendors regularly update the firmware on their devices to apply security patches and bug fixes. These security patches and bug fixes are typically a response to detecting vulnerabilities in a device \u2013 vulnerabilities that are often known to the public or published on the dark web. This means that failing to apply a firmware update when it\u2019s available may leave a device vulnerable to a known attack \u2013 essentially creating an invitation to be hacked. Moreover, in addition to addressing vulnerabilities, these firmware updates can often add new security capabilities that enhance a device\u2019s ability to detect or fend off an attack.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-a5daf49 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a5daf49\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bd50796\" data-id=\"bd50796\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-784c4a1 elementor-widget elementor-widget-heading\" data-id=\"784c4a1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><h3>Turn Off Unused Services<\/h3><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-0087bd6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0087bd6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2dedb57\" data-id=\"2dedb57\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fd8529f elementor-widget elementor-widget-text-editor\" data-id=\"fd8529f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tMany IoT devices come with more features and capabilities than are required for a particular use case. Unused features are not necessarily more vulnerable than active ones, but they do increase the potential attack surface on the device. Enterprises can reduce this attack surface by disabling all features that aren\u2019t being used. For example, enterprises that use the\u00a0<a href=\"https:\/\/www.sierrawireless.com\/products-and-solutions\/routers-gateways\/alms\" rel=\"noopener\">AirLink\u00ae Management Service (ALMS)<\/a>to administer their devices should turn off remote access to the device\u2019s web-based UI. Turning off unused services in this way will eliminate the chance that hackers can exploit current and future vulnerabilities that affect the disabled feature.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-fa2b5d5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fa2b5d5\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b761c9a\" data-id=\"b761c9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6360bf2 elementor-widget elementor-widget-heading\" data-id=\"6360bf2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><h3>Leverage Firewalls to Manage Accepted Traffic<\/h3><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-9a5a2c4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9a5a2c4\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-dd3f637\" data-id=\"dd3f637\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a253b43 elementor-widget elementor-widget-text-editor\" data-id=\"a253b43\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tA surprising number of enterprises are not using all of their devices\u2019 security functionality, such as the built-in firewall, to restrict access to enabled services. Built-in firewall functionality enables administrators to limit the types of traffic that pass through the device. Enterprises should allow only expected traffic to be sent and received. This functionality helps block any unwanted traffic that might represent an attack.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-88ad893 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"88ad893\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bb8ece2\" data-id=\"bb8ece2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6abc666 elementor-widget elementor-widget-text-editor\" data-id=\"6abc666\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIf your device does not have a built-in firewall, strongly consider the use of a private network option from your connectivity provider to make sure that it is not exposed to the public internet.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-c4a8d5e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c4a8d5e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8a67dcb\" data-id=\"8a67dcb\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c9ef3d0 elementor-widget elementor-widget-heading\" data-id=\"c9ef3d0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><h3>Monitor Activity with a Management System<\/h3><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-99cf376 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"99cf376\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0f3c275\" data-id=\"0f3c275\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-374794d elementor-widget elementor-widget-text-editor\" data-id=\"374794d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tUsing a management system to monitor activity provides enterprises with improved functionality and insights, allowing them to better secure their devices. For example,\u00a0ALMS supports over-the-air device configuration and software updates, making it easier for enterprises to make firmware updates that include security updates, bug fixes and new security capabilities. In addition, ALMS features interactive monitoring dashboards and maps that show the status, signal strength, data usage and location of all registered\u00a0<a href=\"https:\/\/www.sierrawireless.com\/products-and-solutions\/routers-gateways\" rel=\"noopener\">AirLink gateways<\/a>. If this information indicates malicious activity, enterprises can then take action to fend off an attack or recover from a successful breach. With ALMS, users can more easily update their devices\u2019 firmware and keep a finger on the pulse of their IoT devices\u2019 activity, helping them better prevent, detect and react to attacks.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-e100207 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e100207\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bc9c834\" data-id=\"bc9c834\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-511a625 elementor-widget elementor-widget-text-editor\" data-id=\"511a625\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tCybersecurity is hard, and the unique challenges of the IoT make it even harder. Though it is impossible to make themselves 100 percent secure, enterprises that make cybersecurity a priority by choosing IoT solutions with strong built-in security and follow the five IoT security best practices above can significantly reduce the probability of a successful attack.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Enterprises are moving cyber security and resiliency to the top of their priority lists (if they were not there already). This is especially true for enterprises building or managing IoT applications. Attacks which used IoT devices to launch distributed denial of service attacks (DDoS) are raising both consumer and business customers&rsquo; fears regarding the security of the IoT. When it comes to cybersecurity, IoT devices come with their own unique security challenges. Here are five key best practices enterprises can adopt to significantly lower the risk of a successful attack on their IoT infrastructure.&nbsp;<\/p>\n","protected":false},"author":305,"featured_media":4123,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[195],"tags":[93],"ppma_author":[1945],"class_list":["post-774","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-iot","tag-internet-of-things"],"authors":[{"term_id":1945,"user_id":305,"is_guest":0,"slug":"larry-leblanc","display_name":"Larry LeBlanc","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","user_url":"","last_name":"LeBlanc","first_name":"Larry","job_title":"","description":"Larry Leblanc is Chief Engineer, &nbsp;Security at Sierra Wireless. He has more than 25 years of experience in telecommunications network management and wireless communications industries. Earlier he was Chief Technology Officer and co-founder of In Motion Technology, a trusted supplier of vehicle-area network solutions for markets including public safety and utilities. In Motion was acquired by Sierra Wireless in 2014."}],"_links":{"self":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/774","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/users\/305"}],"replies":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/comments?post=774"}],"version-history":[{"count":4,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/774\/revisions"}],"predecessor-version":[{"id":38138,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/774\/revisions\/38138"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media\/4123"}],"wp:attachment":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media?parent=774"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/categories?post=774"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/tags?post=774"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/ppma_author?post=774"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}