There is no question that the Internet of things (IOT) has revolutionised commerce, providing service providers with a direct, vibrant and immediate channel of interaction with customers – and immediate gratification for consumers! However, the Internet is under threat from evolving cyber threats and IOT security is of growing concern to the market.
This is according to Paul Evans, CEO of Redstor, an international data management and security specialist firm.
Evans says given that IOT devices need Internet to function, perhaps the real issue is around how to secure a network and ensure that it cannot be accessed by an unauthorised individual?
“Maybe so, however, for organisations of all sizes IOT can mean something slightly different; network connected devices such as printers, CCTV, Webcams and WiFi routers represent the IOT landscape as it currently stands for businesses and in every-day office life there seems nothing threatening about this,” he continues.
Redstor says IOT has a shady reputation as far as security is concerned, and is known for poor levels and regular hacks.
As Evans explains, hackers have worked out how to transform connected devices into botnets to launch large-scale attacks on other organisations and networks.
The company continues that in 2016, hackers were able to turn over 150 000 IOT devices into botnets and initiate an attack with global repercussions.
“The problem stemmed from poor credential management; the Mirai strain of malware used, took advantage of default passwords and account settings and with relative ease was able access the devices,” Evans says.
While it is difficult to predict when a network could be at risk and even fend off any attacks, it is possible to limit the potential fallout of an attack by taking proactive steps to mitigate risks and effects.
“With IOT devices the solution lies in the way they are set up and administered; hosting IOT devices on a separate network to core business or organisational systems will begin to mitigate the damage that can be done,” Evans continues.
When it comes to IOT and devices, the key thing is to regularly update passwords and this cannot be basic or obvious.
Network monitoring tools can also be implemented to help assure the protection of office devices.
Redstor says while this may not stop an attack it may pick one up, and flag up any vulnerabilities within systems allowing network managers to patch and prevent future attacks.
For nearly 20 years, Redstor has been the data management and security company of choice for businesses and organisations looking for a trusted advisor to manage and secure its data.
This experience, shaped by its community creates its world-class software underpinning Redstor’s Cloud Data Management and Security Platform. Its platform addresses backup, DR and archiving and our journey towards security, access and insight, all managed and controlled from one place.
Redstor has a face behind its cloud…. it prides itself on the fact that it is a company built, managed and optimised by people, for people and it gives its customers control over their most valuable asset…their data wherever, whenever, forever.
Our comments policy does not allow anonymous postings. Read the policy here