Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Utilities Tech Outlook
The rapid shift to remote work means that even consumer IoT devices that are not connected to business networks will pose a danger to enterprises' security teams. Ensure the machines don't operate with their default security settings and can't be taken over easily.
FREMONT, CA: In every sector, the ability to monitor anything from the coffee level left in your pot to a real-time inventory of products in a warehouse is compelling. Security teams face growing difficulty and challenges in identifying, handling, and protecting all of these properties, with the number of IoT devices estimated to exceed 55.7 billion worldwide by 2025. Evolving standards may create further complexities for data protection and privacy.
Here are three issues of IoT asset management:
Understanding Configuration Options
Security teams must ensure that the devices they have found are not at risk from newly disclosed vulnerabilities or default configurations that are not safe. From corporate IoT devices such as connected TVs and IP cameras, and from employee IoT devices such as smartwatches, fitness trackers, and more, efficient exploits are also made public.
The rapid shift to remote work means that even consumer IoT devices that are not connected to business networks will pose a danger to enterprises' security teams. Ensure the machines don't operate with their default security settings and can't be taken over easily.
Understanding What IoT Devices Are in Our Environments
Unlike laptops or servers, IoT devices can serve many purposes, and the resulting objectives for management and security become complicated. A sensor on a smart shelf used for the control of warehouse inventory is and should be handled differently from a connected ventilator, a power plant temperature monitor, or a connected surveillance camera.
It's not helpful to group IoT devices into one category. Instead, security teams need to know what the system is used for, what happens if it fails or is hacked, and how long it can stay in operation.
Identifying New IoT Devices
Organizations need plans from unexpected channels that account for devices and malicious intent. Data from their network infrastructure and other sources, such as vulnerability scanners and endpoint detection solutions, should be obtained by security teams. This will help them understand which devices have access to the network and which are handled from a security perspective. Then they will be able to classify new devices and decide if security software can handle and secure those devices or not.
I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info
However, if you would like to share the information in this article, you may use the link below:
www.utilitiestechoutlook.com/news/three-issues-of-iot-asset-management-nwid-792.html