From the Blogosphere
IoT Security: Five Fundamentals | @ThingsExpo #BigData #IoT #IIoT #M2M
The reality is that the IoT is changing everything, especially cyber security
By: Tom Kelly
Mar. 18, 2016 02:00 PM
A key and wide-ranging tech trend that's affecting enterprises and consumers alike is the Internet of Things (IoT). It's a development that's already transforming how we work and live as entrepreneurial minds continue to create use cases for billions of connected things.
Transformations of this magnitude come with growing pains. Gartner recently revealed unexpected implications arising from the IoT, pointing out that by 2020, firms will have increased annual security budgets by 20 percent (up from less than one percent in 2015) in order to address security compromises in the IoT. Even more disturbing is that Gartner expects that a black market exceeding $5 billion will exist to sell fake sensor and video data that enables criminal activity by 2020.
Everything from security cameras to smart TVs, wearables to point-of-sale systems and copy machines to the break room refrigerator are entering the corporate environment today, creating pin holes across the enterprise security landscape. It is clear that the malicious intent of hackers has not only increased, but it has become more creative. The reality is that the IoT is changing everything, especially cyber security, and without the proper tools, it's nearly impossible to know what is connecting to your network.
A Complex New Landscape
The infiltration of smart devices, while new and more efficient, may soon create more of a negative impact than a positive one. By using connected devices that are agentless, malicious actors are able to gain access to corporate networks and may not be discovered until after an attack.
Adding IoT vendors to the mix of those who deliver goods within the confines of corporate campuses only increases the complexity of the issue. CISOs now must extend their security monitoring policies and procedures to incorporate every supplier and vendor in the supply chain, no matter how benign their products might seem to network security.
This concern is not merely theoretical. A major carrier recently suffered from a breach when hackers posted 300,000 customer records online. Imagine the look on the CEO's face when he learned that the data was stolen from a third-party marketing firm involved in the carrier's supply chain. Smart CISOs and CIOs must look to implement vendor risk management processes as part of their own operational security reviews before they find themselves facing an angry board of directors who are looking for answers about how the breach occurred.
Five Fundamentals for IoT Security
Security for Today's Complexity
Like any vulnerable and protected resource, it's important to ensure these devices are kept behind trusted firewalls and, as with any device in your network, constantly monitor them for changes against normal. Other best-practice methods include establishing a "multi-tenant" reporting environment consolidating and isolating IoT devices into a unique and highly granulated reporting domain.
The applications of the IoT are limited only by the imagination - and, unfortunately, that goes for cybercriminals as well. Because of the IoT's inherent risk, IT organizations must find new ways to secure the network. This involves finding tools that overcome data silos and cross-correlate analytics in real time for a comprehensive window into the threat landscape. Such tools will help IT teams confront and overcome current security challenges and position them for what lies ahead.
Reader Feedback: Page 1 of 1
Latest Cloud Developer Stories
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
SYS-CON Featured Whitepapers
Most Read This Week