For years, experts have warned about the danger of Internet of Things (IoT) devices, often built by companies on the cheap with little or no interest in building security into their products. Many of these insecure devices have found their ways into businesses, interacting and exchanging cloud-based information with other parts of the corporate infrastructure.
With the emergence of powerful IoT malware such as Mirai, the bad news predictions are being borne out. The reality is that any connected device provides an attack vector for adversaries.
Still, the prospect of malware-infected devices repurposed as a zombie army acting at the behest of cyberattackers hasn’t slowed IoT adoption. Just the opposite is true, in fact.
Companies in sectors such as manufacturing, transportation, healthcare and utilities continue to deploy IoT devices in ever-greater numbers, and researchers expect billions of devices will be in use around the world by the end of this decade.
When it comes to IoT security, there may be no silver bullet. But that doesn’t mean you’re left defenseless.
As noted in a recent AT&T Cybersecurity Insights report, "The CEO's Guide to Securing the Internet of Things," companies can mitigate the threats by adopting a proactive approach that builds in security from the start. The goal should be to lay down a strategy that aligns IoT security with the organization’s existing cybersecurity policies and systems.
Many of these insecure devices have found their ways into businesses
Here are seven blocking and tackling tips your cybersecurity team should consider implementing.
The very connectedness of the IoT leaves it open to security and safety vulnerabilities. But by implementing a tight security policy for your growing arsenal of devices, your organization will go a long way to guarding against IoT-powered zombie attacks.
Visit the AT&T IoT security page to learn more about protecting your business.
Share this with others
READ MORE ARTICLES ON:
Sign up for the AT&T Business newsletter
Please provide the following information to access your document:
* To access your content, please check your browser settings to make sure pop-up windows are allowed.