Sunday, September 27, 13:19
Home security IoT devices are a big risk for companies

IoT devices are a big risk for companies

Teddy bears, coffee makers and cars are some of the Internet of Things (IoT) devices that connect to corporate networks and could leave entire organizations exposed to cyber attacks.

A research paper by Palo Alto Networks describes in detail the growth of IoT devices connected to corporate networks and their wide variety.

Some of the most common devices connected to the networks of organizations are vehicles, games, medical devices and sports equipment such as fitness trackers.

These devices can help people in many different things or in work or in their personal lives. But that does not mean that they do not create additional security problems in corporate networks.

 and production

In many cases, these "shadow IoT" devices are added to the network without the knowledge of the security team.

This could potentially leave the corporate network vulnerable because some IoT devices are bad safety, which means that they can be easily identified and violated. Also the fact that some workplaces still have flat networks means that if one device violated, an attacker could move from the IoT device to another system.

"If a device has an address IP, it can be found. "Unfortunately, very often, they have a complete lack of security features and use standard passwords," Greg Day of Palo Alto Networks told ZDNet.

"Given that some devices are so cheap, the cost of adding security is simply not considered viable."

Even IoT devices connected to the network by the organization itself may contain security vulnerabilities that could allow hacker to gain full access to network. A well-known example of this type is when some hackers broke into a fish tank to invade a casino network and steal customer information.

Organizations need to be more careful with the IoT devices connected to their corporate network. The key to this is to see them Appliances network and ensure that IoT products are segmented so that they can serve as a gateway for a larger, more extensive attack.

LEAVE ANSWER

Please enter your comment!
Please enter your name here

Teo Ehc
Teo Ehchttps://www.secnews.gr
Be the limited edition.

LIVE NEWS

How to use the Apple Translate App on your iPhone?

Apple's Translate app, introduced in iOS 14, allows iPhone users to do ...

How to turn off private Wi-Fi MAC addresses

Apple has changed the way the iPhone and iPad connect to Wi-Fi networks starting with the iOS 14 and iPadOS 14 updates ....

Mac: See how to rename multiple files at once!

Many people have more difficulty renaming files on a Mac than renaming Windows. The Finder of ...

How can you control the performance of your Chromebook?

Many times users wonder about the performance of their computer and would like to be able to take a look at the system ...

How To Detect Hidden Surveillance Cameras With Your Phone

During our holidays or on business trips, we are forced to stay in hotels or Airbnb ....

How to play the hidden game of Android 11

Google usually includes the so-called "Easter Eggs" in every new version of Android that is released. And Android 11 is not ...
00:01:49

Ring: Amazon's new device is a drone with a security camera

Amazon is ready to launch a new Ring security camera mounted on top of a flying drone.

Software developers were very productive during the pandemic

The productivity of most software development teams increased during the Covid-19 pandemic crisis, according to a new study. But if you are ...

Cisco: 25 Serious Defects in IOS and IOS XE Software

Cisco has warned customers using IOS and ISO XE software to apply updates for 25 high-security vulnerabilities ...

The new Microsoft Edge feature will reduce memory and CPU usage

To improve memory and CPU usage on the Edge, Microsoft is developing a new feature called "Sleeping Tabs".