Overlay Security on IoT Networks to Conquer Vulnerabilities

Overlay Security on IoT Networks to Conquer Vulnerabilities

IoT networks are under attack, with potentially dire consequences for organizations that fail to protect them with adequate security and control measures.

Last summer, the FBI issued analertthat warned of cyber criminals ramping up attacks on Internet of Things. Specifically, adversaries are taking advantage of weak authentication, unpatched firmware or other software vulnerabilities, and authentication credentials that can be attacked over the Internet.

The proliferation of IoT devices combined with this reported increase in cyberattacks presents a nightmare of special security challenges faced by industrial enterprises that commercially deploy IoT devices. Unfortunately, it’s not feasible to replace or redesign IoT devices already deployed in the field. But by overlaying security and control measures on existing IoT networks, these organizations may just have found the key to mitigating vulnerabilities.

Let’s take a deeper dive into IoT vulnerabilities and security risks, as described by the National Institute of Standards and Technology (NIST). NIST’s 2018 report “Considerations for Managing Internet of Things (IoT) Cybersecurity and Privacy Risks” identified three problems faced by organizations that deploy IoT devices. 

First, IoT devices interact with the physical world in ways conventional IT devices usually do not. NIST points out that cybersecurity and Privacy policies must take into account the ramifications of IoT devices making changes to physical systems and affecting the physical world. For instance, the security ramifications of a compromised device controlling a town’s water supply are vastly different from a compromised device disclosing customer records. NIST also notes that “operational requirements for performance, reliability, resilience and safety may be at odds with common cybersecurity and privacy practices for conventional IT devices.”

Second, many IoT devices cannot be accessed, managed or monitored in the same way conventional IT devices can. Because many IoT devices are on private networks or in remote locations, organizations many need to perform manual tasks when updating or protecting large numbers of IoT devices. Employees may need special tools and training, and security models may need to account for manufacturers and other third parties having access or control over devices. Obviously, manual tasks are cost-prohibitive and time-consuming for those organizations that have geographically dispersed locations that must be protected and updated.

Share it:
Share it:

[Social9_Share class=”s9-widget-wrapper”]

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

You Might Be Interested In

Behavioural biometrics: How will it improve the consumer experience?

6 Sep, 2018

Behavioural biometrics is a brave new world of seamless, hassle-free authentication that is set to revolutionise – and personalise – …

Read more

This Is How Artificial Intelligence Is Revolutionizing Influencer Marketing

1 Jun, 2021

Artificial Intelligence (AI) has the potential to change the business world significantly. The International Data Corporation (IDC) notes that industries …

Read more

Using Artificial Intelligence to Make Sense of Mountains of Data

23 Feb, 2021

inancial institutions have come a long way when it comes to utilizing next-gen technologies such as artificial intelligence and machine …

Read more

Do You Want to Share Your Story?

Bring your insights on Data, Visualization, Innovation or Business Agility to our community. Let them learn from your experience.

Get the 3 STEPS

To Drive Analytics Adoption
And manage change

3-steps-to-drive-analytics-adoption

Get Access to Event Discounts

Switch your 7wData account from Subscriber to Event Discount Member by clicking the button below and get access to event discounts. Learn & Grow together with us in a more profitable way!

Get Access to Event Discounts

Create a 7wData account and get access to event discounts. Learn & Grow together with us in a more profitable way!

Don't miss Out!

Stay in touch and receive in depth articles, guides, news & commentary of all things data.