Top 10 Risk-Reduction Strategies to Protect IoT Devices

Forums Security News (Security) Top 10 Risk-Reduction Strategies to Protect IoT Devices

Tagged: 

  • This topic has 1 voice and 0 replies.
Viewing 0 reply threads
  • Author
    Posts
    • #35414
      Telegram SmartBoT
      Moderator
      • Topic 5959
      • Replies 0
      • posts 5959
        @tgsmartbot

        #News(Security) [ via IoTGroup ]


        Headings…
        Top 10 Risk-Reduction Strategies to Protect IoT Devices
        Cyber Security Services, an emerging cyber security consulting company, tod
        Top 10 IoT Security Strategies
        New Microsoft Report Reveals Increasing IoT Market Maturity, Partners Share

        Auto extracted Text……

        Cyber Security Services, an emerging cyber security consulting company, today released its top 10 strategies for securing IoT (Internet of Things) devices.
        Now consider the fact that there are billions of business devices — from basic security cameras, HVAC systems, barcode readers, smart locks and smart lighting through more sophisticated building automation systems and industrial machines — all connected within the larger Internet of Things, or IoT.
        We recommend that businesses establish and enforce procedures to change default passwords for every IoT device on the network.
        Whenever possible, separate the corporate network from vendor-managed and unmanaged IoT devices.
        This might include HVAC systems, security cameras, temperature control devices, electronic signage, smart televisions, media centers, security DVRs and NVRs, network-connected clocks, and network-connected lighting.
        Use VLANs to separate and keep track of various IoT devices on the network.
        Lastly, apply an Access Control List, or ACL, to VLANs or network access ports whenever possible to limit communication to the least amount that is required for device operation.
        3. Prevent IoT devices from communicating with the internet unless absolutely necessary.
        While it’s impossible to completely eliminate an IoT security threat, businesses can prevent IoT devices from communicating outside of the organization unless absolutely necessary.
        4. Control which vendors are allowed remote access to IoT devices.
        To improve IoT security, businesses can put controls in place to limit the number of vendors granted remote access to IoT devices.
        A NAC solution with proper switch and wireless integrations can help an organization improve IoT security by detecting most devices and identifying rogue connections to the network.
        It can also apply controls to the devices that are not authorized or granted merely limited access to the network


        Read More..
        AutoTextExtraction by Working BoT using SmartNews 1.0299999999 Build 26 Aug 2019

    Viewing 0 reply threads
    • You must be logged in to reply to this topic.