5 Recommendations to Secure the Internet of Things

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Next

Step 1: Manage Security at Every Level of IoT

Former RSA CTO Deepak Taneja has called the lack of IoT security a "time bomb." During a panel discussion at the TIE Startup Con panel in May 2015, Taneja said that technology is advancing at a rate that's outstripping enterprises' ability to secure internal and cloud resources, and then along comes IoT in the form of all sorts of networked sensors and gadgets. "Organizations aren't spending that much on security. It's increasing, but it's not enough and IoT only makes it worse. So it is a time bomb."

Take a hospital as an example. Virtually every medical device — from the bedside machine monitoring a patient's vital signs to MRI machines — is connected to a network in order to effectively communicate, share data, and improve collaboration among medical personnel. Very few of these have any security technologies to protect them from attackers either stealing information or easily taking control of these devices.

As the connected world grows, each layer of technology needs to incorporate identity to secure the object, its access, and every transaction. Once we start to formulate a plan for each disconnected "thing" morphing into an intelligent and connected item, it becomes obvious that password security is obsolete and there is a need for a technology that is compatible, open, scalable, and proven trustworthy.

A reliance on passwords to prevent attackers from accessing systems, devices, and applications is outdated and ineffective. Attackers typically count on users implementing password-based security protocols, which opens the door to attacks — such as Trojan viruses, phishing, and man-in-the-middle — that take advantage of vulnerabilities. Attackers have evolved from simply wanting to achieve notoriety to becoming sophisticated thieves who steal personally identifiable information (PII) — such as financial and health care records and account numbers — to targeting the rapidly developing Internet of Things (IoT) market, where a hack becomes more personal and potentially life-threatening.

In this slideshow, Phil Montgomery, chief product officer at Identiv, will provide five recommendations to mitigate risk and maintain a strong security posture in this ever-growing connected world.

 

Related Topics : Blade Servers, Business Integration, Ethernet, LAN, Network Protocols

 
More Slideshows

infra96-190x128 7 Ways the Internet of Things Will Impact ITSM

Regardless of the pace at which businesses adopt the IoT, ITSM will have to evolve to deal with IoT-driven changes such as more connected nodes, data points and automation, all of which add complexity. ...  More >>

PorembaDigitalDisruption0x 9 Successful Digital Disruption Examples

Digital disruption isn't so much an IT project as the future of business, and this requires widespread collaboration across all units. ...  More >>

CienaFogComputing0x Why Fog Networking Is Key to IoT Success

The IoT will require serious network investments to make its innovation potential a reality. Take a closer look at fog computing and why it is essential to making IoT a success. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.