• About
  • Advertise
  • Contact
Thursday, May 26, 2022
No Result
View All Result
NEWSLETTER
iotindiana
  • Home
  • Internet of Things
  • Security
  • WAN
  • Cloud Computing
  • Mobile
  • Networking
  • Software
  • Home
  • Internet of Things
  • Security
  • WAN
  • Cloud Computing
  • Mobile
  • Networking
  • Software
No Result
View All Result
iotindiana
No Result
View All Result
Home IoT

From communication to control: The top 10 strategies to secure your IoT devices

by iotadmin
September 27, 2019
in IoT, Security
0
From communication to control: The top 10 strategies to secure your IoT devices
0
SHARES
2
VIEWS
Share on FacebookShare on Twitter

Ohio-based Cyber Security Services has released a list of its top 10 strategies for organisations to secure their vulnerable IoT devices.

The company argues that millions of IoT devices lack adequate security controls and are therefore exposed to cyberattacks. Security fears are paramount in both enterprise and consumer minds; a study from Metova in June found that while 85% of consumers polled would like to monitor utility usage in real-time through IoT devices, full understanding of the term was still required.

The top 10 security strategies are:

  • Changing or updating default passwords over a period of time;
  • Maintaining separate corporate network from vendor-managed and unmanaged IoT devices;
  • Preventing IoT devices from communicating outside the organisation unless it is extremely important;
  • Businesses can put control to limit the number of vendors that are being granted remote access to IoT devices;
  • Implementing a NAC solution to improve IoT security by detecting maximum devices and identifying suspicious connections to the network;
  • Implementing vulnerability scanners provided by commercial vendors help identify the types of devices connected to a network;
  • Running an IDS and IPS on the network to detect malicious network traffic, which saves an IoT device from being compromised;
  • Appropriate device management to make sure that the remotely managed devices are catalogued with records in place detailing registration, configuration, authentication, and other pertinent device data;
  • Restriction on internal and external port communication that should be allowed only when needed;
  • Removal of incompatible OS, applications, and devices from the network for increased safety

A recent study from Irdeto found healthcare organisations lack necessary measures to counter cyber-attacks despite being aware of the areas that are vulnerable and needs protection. In a survey of 232 healthcare security decision-makers, 50% of the respondents cited IT network as the most prominent vulnerable spot within healthcare organisations, followed by 45% of the mobile devices and accompanying apps and 42% IoT devices.

https://www.iottechexpo.com/wp-content/uploads/2018/09/iot-tech-expo-world-series.pngInterested in hearing industry leaders discuss subjects like this? Attend the IoT Tech Expo World Series events with upcoming shows in Silicon Valley, London, and Amsterdam.

Related Stories
Download WordPress Themes Free
Premium WordPress Themes Download
Download Premium WordPress Themes Free
Download WordPress Themes Free
ZG93bmxvYWQgbHluZGEgY291cnNlIGZyZWU=
download mobile firmware
Download Best WordPress Themes Free Download
lynda course free download
Tags: From communication to control: The top 10 strategies to secure your IoT devices
iotadmin

iotadmin

Next Post
IoT devices show resilience against consumer market slowdown, but global uncertainties threaten growth and innovation

IoT devices show resilience against consumer market slowdown, but global uncertainties threaten growth and innovation

Recommended

Facebook reports a big sales jump, helped by mobile ads

3 years ago

Using IoT to help protect the U.S. food supply

3 years ago

Buy CBD Online

  • CBD Oils
  • CBG
  • Sleep spray
  • CBD gummies
  • buy CBD oil
  • Dab pens
  • CBD Patches
  • CBD pills
  • Pet CBD
  • CBD for pain
  • CBD for sleep
  • CBD Flower
Facebook Twitter Youtube RSS

Newsletter

Subscribe our Newsletter for latest updates.

Loading

Category

  • AI
  • Careers
  • Cloud Computing
  • Connected Cars
  • Connected Vehicles
  • Data & Analytics
  • Data Center
  • Data Centers
  • Databases
  • Development
  • Enterprise
  • Hardware
  • Healthcare
  • IIoT
  • Infrastructure
  • Internet of Things
  • IoT
  • IT Leadership
  • Manufacturing
  • Mobile
  • Networking
  • Oil & Gas
  • Open Source
  • Security
  • Smart Cities
  • Smart Homes
  • Software
  • Software Development
  • Standards
  • Technology Industry
  • Uncategorized
  • Unified Communications
  • Virtualization
  • WAN
  • Wearables

About Us

Advance IOT information site of Indiana USA

© 2019-20 iotindiana.com.

No Result
View All Result
  • Home
  • Internet of Things
  • Security
  • WAN
  • IoT
  • Cloud Computing
  • Data Centers
  • Mobile
  • Networking
  • Software

© 2019-20 iotindiana.com.

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In