A reliance on passwords to prevent attackers from accessing systems, devices, and applications is outdated and ineffective. Attackers typically count on users implementing password-based security protocols, which opens the door to attacks — such as Trojan viruses, phishing, and man-in-the-middle — that take advantage of vulnerabilities. Attackers have evolved from simply wanting to achieve notoriety to becoming sophisticated thieves who steal personally identifiable information (PII) — such as financial and health care records and account numbers — to targeting the rapidly developing Internet of Things (IoT) market, where a hack becomes more personal and potentially life-threatening.
In this slideshow, Phil Montgomery, chief product officer at Identiv, will provide five recommendations to mitigate risk and maintain a strong security posture in this ever-growing connected world.
Regardless of the pace at which businesses adopt the IoT, ITSM will have to evolve to deal with IoT-driven changes such as more connected nodes, data points and automation, all of which add complexity. ... More >>
Digital disruption isn't so much an IT project as the future of business, and this requires widespread collaboration across all units. ... More >>
The IoT will require serious network investments to make its innovation potential a reality. Take a closer look at fog computing and why it is essential to making IoT a success. ... More >>