Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

IoT Cyber Security Requires a Deliberate Approach Due to Inherent Risks

A NYC area cyber security consultant and managed services provider (MSP) offers a deliberate approach to IoT cyber security in a new article on the eMazzanti Technologies website. The informative article first reviews the inherent risks of operating numerous IoT devices, including an increased attack surface.

The author then urges readers to identify all connected devices including patching status. He also advocates that network administrators assign unique identities to each device and update passwords. He concludes with advice about idle devices, physical security, and continuous monitoring.

“Connected IoT devices gather and share immense amounts of data,” stated Almi Dumi, CISO, eMazzanti Technologies. “But the seemingly limitless opportunities for innovation also bring significant risk.”

Recommended AI News: Digital Workforce Unlocks Business Opportunities Worth Six Figures for Planet Mark

Below are a few excerpts from the article, “IoT Cyber Security Requires a Deliberate Approach Due to Inherent Risks.”

IoT Brings Inherent Risks

“From recent IoT cyber security news, we learn that a white hat hacker used Bluetooth to hack into a Tesla Model X in under two minutes. And, hackers attacked video surveillance company Verkada, compromising 150,000 active surveillance cameras, many in secure locations.”

Identify Connected Devices and Update Status

“First, take an inventory of devices across the IoT infrastructure. Understand what they do and identify older models that may present increased security challenges. The initial inventory process can take some time, but it allows organizations to classify devices more easily for risk management.”

Related Posts
1 of 30,746

Recommended AI News: Rising Network Automation Unlocks Massive Growth Opportunities Across 5G

Assign Unique Identities and Credentials

“Devices typically come with default device names and passwords. Too often, organizations leave the default credentials in place, leaving devices and the network vulnerable to hackers. Make sure that each device and system has a distinctive identity.”

Deactivate Idle Devices and Features

“Each new device and each feature on the device add more access points for attackers to exploit. Conduct a regular review of devices and disable any devices or features not used regularly. Likewise, when purchasing new devices, keep security in mind. For instance, unless you need a USB port, avoid purchasing a device that includes one.”

Partner with IoT Cyber Security Experts

The security experts at eMazzanti Technologies understand the challenges that organizations face when implementing IoT solutions. The company’s network security solutions include automated network mapping and inventory, as well as round-the-clock monitoring. From access management to encryption and more, they provide robust security to counter modern threats.

Recommended AI News: FoundriesFactory Supports Arm’s Project Cassini for Secure Production Edge Deployments

[To share your insights with us, please write to]

Comments are closed.