A recent DDoS attack revealed that Internet of Things (IoT) devices appear to be a safety threat. Many IT executives of big companies need to realize that significant structural changes should be made. This IoT threat can be effectively combated by using simple ways. IoT has developed three ways of threats: an attack of an IoT army around the world; forcing the enterprises owned by the Internet of Things to start a war against each other; permitting IoT devices to battle against your own company.
If you think that making some changes meant to secure your company will help, you might be wrong. The first scenario could affect your business irrespective of what you do to stop it. Nevertheless, your structural changes could at least protect your company from scenarios like two or three to happen, blocking those attacks.
Many of the IoT electronics are acquired and approved by people who are not part of the CISO’s team or IT team. If Facilities will purchase light bulbs and door locks and Operations will buy some markers, then you could imagine the next scenario. Some unfortunate events have demonstrated that a cyber thief who had tested the weakness of a firewall had managed to release the locks on doors in IoT. The light bulbs from this net were flickering, being able to broadcast a message to someone who was looking at its windows.
This tricky net called IoT can access devices which have never depended on of IT approvals. This terrible problem needs to be fixed. Any big company should follow some steps to protect their data. Firstly, they need to train the employees what IoT devices mean and what harm could they provoke. Secondly, you should ask all IT employees or those from the CISO department to approve all those devices. These devices will be able to bypass any network security.
All IoT devices have the same problem, meaning the capabilities of the internal communications system of the house. They have an antenna which makes possible the transport of firmware updates without even requesting for permission. Some monitors can track these independent net signals on a corporate campus, but not also if this campus is full of tablets, wireless laptops, and smartphones.
Do you believe that your company’s data is 100% secured and your firewall can never be hacked by any specialist? You should think twice at your business’ security.
Image courtesy of: flickr