Saturday, February 20, 18:50
Home business Organizations: Vulnerable to cyber attacks due to the expansion of IoT devices

Organizations: Vulnerable to cyber attacks due to the expansion of IoT devices

Organizations are at a much higher risk of cyber-attacks due to the expansion of IoT (Internet of Things) devices into their networks, according to a new study by Palo Alto Networks threat intelligence team, Unit 42. threats vulnerabilities affecting the current ecosystems of the IoT device supply chain, published during National Cybersecurity Awareness Month, which this year focuses on the role played by individual users in strengthening it security of IoT devices.

According to Infosecurity, the researchers first pointed to a recent study, the findings of which showed that 89% of organizations have seen an increase in the number of IoT devices in their network in the last year, which significantly expands its area attack. The researchers also stressed that organizations need to consider the vulnerabilities of the supply chain of IoT devices, where a third-party is installed. software with vulnerabilities or is part of certain components, such as a application ή firmware.

Organizations: Vulnerable to cyber attacks due to the expansion of IoT devices

A common misconduct of organizations was the integration of third-party components and hardware without listing the components that were added to the device, according to the survey. This makes it difficult to determine how many products from the same supplier are affected when a vulnerability in one of these components.

In addition, the researchers noted that it is difficult for users to know which components work on any IoT device, each of which has its own inherent security properties that depend on other components with their own security properties. This means that an entire device can be compromised if only one of these components is vulnerable. They also reported that users who manage networks with IoT Appliances often do not know how many of them are connected to a corporate network. This makes it difficult to monitor potentially vulnerable devices, while increasing the chances of cyber attacks succeeding.

Organizations: Vulnerable to cyber attacks due to the expansion of IoT devices

Researchers Anna Chung and Asher Davila pointed out that it is vital to maintain a list of devices connected to the network to identify devices and the suppliers or manufacturers of those devices that use a vulnerable component so that the administrator can fix, monitor, or disconnect them if necessary. They added that full visibility of the devices connected to the network and informing the organizations when a device shows vulnerabilities, is vital to defend their infrastructure from possible cyber attacks.

LEAVE ANSWER

Please enter your comment!
Please enter your name here

Pohackontas
Pohackontashttps://www.secnews.gr
Every accomplishment starts with the decision to try.

LIVE NEWS

Google Assistant: How can you delete your recordings?

Google Assistant can make your daily life much easier. However, it also involves some privacy issues, as ...

Microsoft: Office 2021 / Office LTSC coming in the second half of 2021

Microsoft announced that the Microsoft Office Long Term Service Channel (LTSC) and Office 2021 will be released in 2021, for ...

How to quickly create QR codes with Bing

If you ever need to create a QR code, but you do not know how, Microsoft has an easy-to-use tool available in any program ...

Brave: Onion addresses leaked to DNS traffic

The Tor function included in the Brave web browser, allows users to access .onion dark web domains within ...

What are the 6 most known attacks on gaming companies?

A few days ago, the gaming company Big Huge Games informed the players that it was the victim of an attack, which affected its data ...

Xbox gift cards are sold at a 10% discount on Amazon

Xbox owners can save some money on games, add-ons, subscriptions and more if they buy Xbox gift cards at ...

Perseverance: NASA spacecraft lands on Mars!

The spacecraft "Perseverance" successfully landed yesterday, shortly before 11 pm Greek time on Mars. Aim of this mission of ...

YouTube: You can play 4K videos on devices with low resolution screens

Youtube application on Android allows you to play videos up to 4K resolution. All you need is a phone with ...

Top positions Software Engineering and coding skills for 2021

Due to COVID-19, recruitment efforts and employment opportunities fell sharply last year. However, the technology industry has proven to be more resilient ...
00:10:13

Phishing emails: How to recognize them and how to protect yourself?

https://www.youtube.com/watch?v=iME-CzlKVzc Το phishing είναι ίσως η μεγαλύτερη απειλή στον κυβερνοχώρο εδώ και περισσότερα από πέντε χρόνια. Γι΄...