Tuesday, March 9, 2021
  • Setup menu at Appearance » Menus and assign menu to Top Bar Navigation
Advertisement
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
No Result
View All Result
Home Internet Security

There’s a growing blind spot for your security team during the pandemic: IoT devices

August 19, 2020
in Internet Security
Australia releases draft IoT cybersecurity code of practice
585
SHARES
3.3k
VIEWS
Share on FacebookShare on Twitter

The pandemic and subsequent lockdown have dramatically increased the number of employees around the world working from home. For many organizations, this has involved the purchase and deployment of new laptops and mobile devices, changes in remote-work security policies, and adoption of new security technologies. The growth in remote work is compounded by another global trend: the rise of internet of things (IoT) devices at home and at work. In fact, one trillion IoT devices are expected by 2025, and most security teams have zero visibility into them. As consumer IoT devices increasingly share the same network as corporate devices, consumer IoT devices effectively expand the organization’s attack surface and exacerbate this growing blind spot. 

Unfortunately, many IoT devices are released with serious security vulnerabilities and can be compromised easily. Without a federally enforced standard governing the security of consumer IoT devices in the US, device manufacturers have been permitted to prioritize time-to-market above security. This lack of regulation has allowed systemic issues like insecure admin interfaces, poor authentication schemes, and firmware vulnerabilities to persist across brands and types of devices. Once a smart device is hacked, the opportunities for a malicious actor to move laterally to enterprise assets or steal employee credentials greatly increases. Until meaningful legislation is passed, enterprises in the US will be entirely responsible for protecting their assets and devices from the risks associated with sharing a network with IoT devices. 

You might also like

Microsoft Exchange zero-day attacks: 30,000 servers hit already, says report

Ezviz C3X outdoor security camera review: Simple setup, superb features Review

Supernova malware clues link Chinese threat group Spiral to SolarWinds server hacks

While businesses may not be able to dictate what devices employees are allowed to keep on their home networks, there are still many options available to IT departments to protect company assets. Endpoint security suites provide tools to monitor any malicious IoT device traffic and can isolate device-level risk by focusing on app and data security on personally owned devices used on the home network. Employee training can educate employees on the security benefits of turning off smart speakers during company calls or how to segment their home network to separate IoT devices from company assets. 

Want to learn more about how to keep your corporate assets safe in a remote work setting? Be sure to register for Forrester’s Security and Risk Global, a live, virtual event on Sept. 22 to Sept. 23, 2020, where I will be presenting a session entitled, “Connected Homes Are Leaving The Doors Open To Enterprise Data Theft.” 

This post was written by Senior Analyst Christopher Sherman, and it originally appeared here. 

Credit: Zdnet

Previous Post

Rolls Royce, ING Bank and AB InBev join Blockchain Education Alliance

Next Post

B2B Marketers & Data: 6 Questions Answered

Related Posts

Microsoft Exchange zero-day attacks: 30,000 servers hit already, says report
Internet Security

Microsoft Exchange zero-day attacks: 30,000 servers hit already, says report

March 9, 2021
Ezviz C3X outdoor security camera review: Simple setup, superb features Review
Internet Security

Ezviz C3X outdoor security camera review: Simple setup, superb features Review

March 9, 2021
Supernova malware clues link Chinese threat group Spiral to SolarWinds server hacks
Internet Security

Supernova malware clues link Chinese threat group Spiral to SolarWinds server hacks

March 9, 2021
McAfee sells its enterprise business to private equity group as it focuses on consumer security
Internet Security

McAfee sells its enterprise business to private equity group as it focuses on consumer security

March 9, 2021
Everything you need to know about Microsoft Exchange Server hack
Internet Security

Everything you need to know about Microsoft Exchange Server hack

March 8, 2021
Next Post
B2B Marketers & Data: 6 Questions Answered

B2B Marketers & Data: 6 Questions Answered

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

January 6, 2019
Microsoft, Google Use Artificial Intelligence to Fight Hackers

Microsoft, Google Use Artificial Intelligence to Fight Hackers

January 6, 2019

Categories

  • Artificial Intelligence
  • Big Data
  • Blockchain
  • Crypto News
  • Data Science
  • Digital Marketing
  • Internet Privacy
  • Internet Security
  • Learn to Code
  • Machine Learning
  • Marketing Technology
  • Neural Networks
  • Technology Companies

Don't miss it

Microsoft Exchange zero-day attacks: 30,000 servers hit already, says report
Internet Security

Microsoft Exchange zero-day attacks: 30,000 servers hit already, says report

March 9, 2021
Is investing in AI the highest ROI opportunity?
Data Science

Is investing in AI the highest ROI opportunity?

March 9, 2021
Dalhousie researchers use machine learning to track COVID-related emotions on social media | Provincial | News
Machine Learning

Dalhousie researchers use machine learning to track COVID-related emotions on social media | Provincial | News

March 9, 2021
Ezviz C3X outdoor security camera review: Simple setup, superb features Review
Internet Security

Ezviz C3X outdoor security camera review: Simple setup, superb features Review

March 9, 2021
Operationalizing AI – Introduction to the ModelOps Pipeline
Data Science

Operationalizing AI – Introduction to the ModelOps Pipeline

March 9, 2021
SCA invests in Australian AI and machine learning company
Machine Learning

SCA invests in Australian AI and machine learning company

March 9, 2021
NikolaNews

NikolaNews.com is an online News Portal which aims to share news about blockchain, AI, Big Data, and Data Privacy and more!

What’s New Here?

  • Microsoft Exchange zero-day attacks: 30,000 servers hit already, says report March 9, 2021
  • Is investing in AI the highest ROI opportunity? March 9, 2021
  • Dalhousie researchers use machine learning to track COVID-related emotions on social media | Provincial | News March 9, 2021
  • Ezviz C3X outdoor security camera review: Simple setup, superb features Review March 9, 2021

Subscribe to get more!

© 2019 NikolaNews.com - Global Tech Updates

No Result
View All Result
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News

© 2019 NikolaNews.com - Global Tech Updates