dcsimg

5 Recommendations to Secure the Internet of Things

  • 5 Recommendations to Secure the Internet of Things-

    Step 5: Protect Identities, Not Gateways

    Digital certificates are the proven means of securing an identity. Traditionally a complex and expensive system, certificates are now available from many vendors that provide them to organizations more cost-effectively via the cloud.

    A cloud-based service can deliver a company-owned certificate, an Internet-based certificate, or a government-generated certificate into any form of credential that will protect an identity based on whichever standard is adopted by the user.

    An identity can be used across different environments using the same technology. The significant advantage to this method is that it removes the proliferation of passwords, duplication of identities, and counterfeiting of goods. A digital certificate cannot be copied, altered, or transplanted from a credential.

    From protecting your log-on across multiple sites to encrypting your email and hard disk, embrace multifactor authentication to avoid being the next victim.

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8

5 Recommendations to Secure the Internet of Things

  • 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
  • 5 Recommendations to Secure the Internet of Things-7

    Step 5: Protect Identities, Not Gateways

    Digital certificates are the proven means of securing an identity. Traditionally a complex and expensive system, certificates are now available from many vendors that provide them to organizations more cost-effectively via the cloud.

    A cloud-based service can deliver a company-owned certificate, an Internet-based certificate, or a government-generated certificate into any form of credential that will protect an identity based on whichever standard is adopted by the user.

    An identity can be used across different environments using the same technology. The significant advantage to this method is that it removes the proliferation of passwords, duplication of identities, and counterfeiting of goods. A digital certificate cannot be copied, altered, or transplanted from a credential.

    From protecting your log-on across multiple sites to encrypting your email and hard disk, embrace multifactor authentication to avoid being the next victim.

A reliance on passwords to prevent attackers from accessing systems, devices, and applications is outdated and ineffective. Attackers typically count on users implementing password-based security protocols, which opens the door to attacks — such as Trojan viruses, phishing, and man-in-the-middle — that take advantage of vulnerabilities. Attackers have evolved from simply wanting to achieve notoriety to becoming sophisticated thieves who steal personally identifiable information (PII) — such as financial and health care records and account numbers — to targeting the rapidly developing Internet of Things (IoT) market, where a hack becomes more personal and potentially life-threatening.

In this slideshow, Phil Montgomery, chief product officer at Identiv, will provide five recommendations to mitigate risk and maintain a strong security posture in this ever-growing connected world.