SecurityBrief Asia logo
Story image

IoT and BYOD still putting firms in the face of danger

24 Aug 2017

As best practice security methods continue to evolve around the Internet of Things, so do the attacks on devices linked to corporate networks, says IT provider Empired.

Those attacks could be malicious or unintentional, and IoT only exacerbates security risks posed by bring your own device policies. Organisations should clamp down on those devices, whether employee devices or IoT devices, to minimise the risk of attack.

“The risk of attack now extends to anyone plugging any device into a company’s network. Together with the risk faced by shadow IT, organisations are unsure how to best protect their network,” comments Empired’s Mark Blower, national business manager of Networks & Security.

According to the company, Business leaders and IT managers are still grappling with employees’ needs to use their own devices, such as phones and laptops as part of their work. Because the software and hardware is not controlled, and because there is limited password control to safeguard information, those devices are an inherent risk compared to in-company devices.

“Numerous IoT devices may be unnecessarily implemented by organisations who do not have a true understanding of security, introducing vulnerabilities for malicious attacks. For example, we recently had a customer whose point of sale system was attacked and customer credit card details were stolen. The hacker was able to gain access through the air conditioning system, which was connected to the network for monitoring purposes,” Blower continues.

He says that organisations should be wary of any non-corporate device connected to their networks.

“For example, wearable technology such as watches and fitness trackers, plus closed circuit television (CCTV), programmable logic controllers (PLC), and operational technology (OT) can all post a potential security risk if not properly secured,” he explains.

Organisations should nominate people who are able to approve what technology is connected to a network, how it is connected and when it is connected, Empired says.

“It’s important for employees to understand that every device connected to the network has the potential to bring the company into disrepute by introducing risk and allowing hackers into the environment,” Blower explains. “Organisations must constantly be on the lookout for anything that may be vulnerable and for new technologies to implement to ensure the company is protected against IoT connectivity hackers. “A business should have policies and procedures in place to cope with breaches regardless of the source. They should follow an internal threat management process to mitigate the risk and ensure it doesn’t happen again,” he concludes.

Story image
AvePoint brings Salesforce Cloud Backup to channel partners
The product adds to the AvePoint suite of trusted Cloud Backup for Microsoft 365 and Dynamics 365 to provide managed service providers with backup and restore capabilities across multiple, popular SaaS providers.More
Story image
Video: 10 Minute IT Jams - Radware VP on the challenges of cloud security
In this interview, Techday speaks to Radware vice president of technologies Yaniv Hoffman, who discusses the primary challenges facing IT organisations in terms of their cloud security apparatus.More
Story image
NVIDIA takes AI into the heart of cybersecurity with Morpheus
The Morpheus application framework will provide security partners with AI-enhanced tools that can detect and prevent security threats.More
Story image
Why a more secure organisation is a collective responsibility
With vast volumes of data moving to the cloud, many IT professionals are frequently challenged to protect their enterprise environment, and there is a greater focus being placed on advancing cybersecurity strategies.More
Story image
5G network security a US$9 billion dollar opportunity - report
The cloud-native nature of 5G networks will have a disruptive and positive impact on the cybersecurity industry in the next few years, with 5G network security presenting a US$9 billion enterprise market opportunity by 2025.More
Story image
ThreatQuotient hits $22.5m in new financing, continues growth streak
“Since we first invested in ThreatQuotient in 2017, their team has continued to prove to the market that there is a critical need for cybersecurity solutions aimed at security operations."More