Skip to content

IOT: INTERNET OF THINGS VS. INTERNET OF THREATS

Internet of Things (IoT) is a rapidly growing industry. It is forecasted that in 2025 there will be 152,200 IoT devices connecting to the internet every minute. Nowadays, modern businesses utilize IoT technologies such as remote healthcare medical devices, agricultural drones, intelligent production lines, and financial modeling systems to reduce costs, increase productivity, and perform economic forecasts. But users often forget about these technologies’ security aspects, making them an easy target for cybercriminals. Therefore, in this blog, we will discuss how to secure your IoT devices and protect yourself from potential cyber-attacks.

Blog image size 1280x720

What are IoT devices?

The Internet of Things (IoT) is a network of physical items implanted with sensors, software, and other technologies that act on the collected data via machine learning. They are devices created to adapt to users’ daily needs and improve daily repetitive tasks. It can be anything from intelligent kids’ toys or smart home appliances to healthcare devices, vehicles, etc.

However, businesses use IoT technology on a larger scale, starting with smart office systems that include smart locks, remote security cameras, and climate control, and ending with complex solutions, such as digital financial modeling, AI-based management solutions, intelligent factory systems, autonomous agriculture, etc.

How IoT is transforming businesses

Research shows that companies who utilized IoT devices for a year noticed these positive trends: improved productivity, reduced labor, increased worker safety, etc.

Here are a few examples of how IoT improves business solutions:

  1. They help you manage and track your inventory by providing various remote control choices.

  2. They are becoming smarter with every connection to the device – the more they track, the more they learn about the patterns, and by doing so, they optimize the user’s experience.

  3. They innovate businesses with the help of predictive maintenance. For example, these devices will help monitor your harvest if you work in agriculture.

  4. They reduce waste by improving power management and water consumption, making businesses more eco-friendly.

  5. They reduce human labor by automating repetitive tasks and helping to allocate workforce resources to more complex tasks.

  6. They automatically schedule and control various production tasks, increasing productivity.

  7. They assist in maintenance. For example, IoT devices measure temperature, humidity, and other indicators to achieve necessary storage conditions.

  8. They can even prevent diseases or health issues by tracking necessary health data, such as blood sugar levels, and reminding about insulin injections.

The hidden dangers of IoT

The advantages are outstanding, but many IoT devices still don’t meet the minimum cybersecurity standards. If not secured, they’re sensitive to cyberattacks, such as an incident with a hijacked Tesla when the attackers gained access to car control while it was driving.

The number of cyberattacks on IoT devices is growing at alarming rates. In the first half of 2021, it was twice as high as the total number of attacks in 2020. Here are the most frequent types of threats carried out against IoT devices:

  • DoS (denial-of-service) attacks are carried out to take down company online assets and steal their sensitive data.

  • Brute-force password attacks lead to criminals gaining access to a particular device.

  • Firmware hijacking is used to access a device when software is downloaded from an illegitimate source.

  • Eavesdropping attack occurs when a hacker intercepts, deletes or changes data sent between two devices.

Top causes making IoT devices insecure

A recent study addressed the most common IoT security issues: lack of personal information privacy, unprotected software, insecure web, weak passwords, and lack of encryption. In general, many people and businesses don’t prioritize security simply because they are unaware of why they need it. Unlike laptops and other types of consumer electronic hardware, many of these devices don’t have built-in security that provides regular security updates.

Another issue is that people don’t change the initial default settings and leave them as they were after setting up IoT devices at their home or office. Many off-brand IoT producers manufacture devices with fewer resources and cheaper components that usually are insecure, creating an ever-increasing threat to the device owners.

How to secure your business IoTs

The main problem for businesses is that they have too many devices and don’t usually supervise them. That creates security gaps in your cybersecurity and opens the doors for eager cybercriminals. So, here are 10 steps for how you can secure your business IoT devices:

  1. Understand the current IoT assets. Run an internal audit to determine how many and what kind of IoT devices you have and who has the access.

  2. Monitor ALL the devices. Keep an eye on all of your devices to protect them from being infected – utilize a tech solution to automate this process.

  3. Apply a tracking system. Implement an identity and access management (IAM) solution that will allow you to track which IoT devices are active and when they go online and offline.

  4. Build an internal security system. Block any potential threat by using network access control (NCA) technologies that authenticate and authorize network users to access your company’s information.

  5. Remove all data from old devices. Pay attention to the devices that aren’t in use anymore, as they may store important information. After removing all data, consider returning them to manufacturers for recycling.

  6. Choose reliable suppliers. Pay attention to the manufacturer of your IoT devices, because it’s very important to know whether the device comes with built-in security and how you should update it from reliable sources in the future.

  7. Keep the devices up-to-date. Various software updates bring bug fixes and security patches, so it’s essential to be updated regularly.

  8. Make unlockable passwords. Build strong password combinations consisting of various symbols, letters, and numbers to make them hard to crack. Also, creating a master password would do the trick if the devices are connected to a phone, tablet, or computer.

  9. Guarantee IoT security. Ensure that you are using port security, invest in a network intrusion detection system, disable port forwarding, and use security solutions like VPN and firewalls.

  10. Secure the Wi-Fi. Last but not least, ensure the Wi-Fi router’s safety – strengthen the router firewall, deactivate WPS, and enable the WPA2 protocol. And, as always, use a strong password for it!

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Nord Security
The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

ESET Endpoint Security 9.0 獲評為商業用戶最佳 Windows 防病毒軟件!

今次的測試由第三方公司 AV-TEST 於 2022 年 5 月至 6 月期間進行。ESET Endpoint Security 9.0 成功抵禦了超過 23,000 種獨特惡意軟件攻擊,例如零日威脅和各種廣泛傳播的惡意軟件,成功在「商業用戶最佳 Windows 防病毒軟件」測試中取得了頂級成績。

按此了解測試詳細
https://www.av-test.org/en/antivirus/business-windows-client/windows-10/june-2022/

關於Version 2
Version 2 是亞洲最有活力的IT公司之一,公司發展及代理各種不同的互聯網、資訊科技、多媒體產品,其中包括通訊系統、安全、網絡、多媒體及消費市場產品。透過公司龐大的網絡、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括中國大陸、香港、澳門、臺灣、新加坡等地區,客戶來自各行各業,包括全球1000大跨國企業、上市公司、公用機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

關於ESET
ESET成立於1992年,是一家面向企業與個人用戶的全球性的電腦安全軟件提供商,其獲獎產品 — NOD32防病毒軟件系統,能夠針對各種已知或未知病毒、間諜軟件 (spyware)、rootkits和其他惡意軟件為電腦系統提供實時保護。ESET NOD32佔用 系統資源最少,偵測速度最快,可以提供最有效的保護,並且比其他任何防病毒產品獲得了更多的Virus Bulletin 100獎項。ESET連續五年被評為“德勤高科技快速成長500 強”(Deloitte’s Technology Fast 500)公司,擁有廣泛的合作夥伴網絡,包括佳能、戴爾、微軟等國際知名公司,在布拉迪斯拉發(斯洛伐克)、布裏斯托爾(英國 )、布宜諾斯艾利斯(阿根廷)、布拉格(捷克)、聖地亞哥(美國)等地均設有辦事處,代理機構覆蓋全球超過100個國家。

ESET Endpoint Security 9.0 獲評為商業用戶最佳 Windows 防病毒軟件!

今次的測試由第三方公司 AV-TEST 於 2022 年 5 月至 6 月期間進行。ESET Endpoint Security 9.0 成功抵禦了超過 23,000 種獨特惡意軟件攻擊,例如零日威脅和各種廣泛傳播的惡意軟件,成功在「商業用戶最佳 Windows 防病毒軟件」測試中取得了頂級成績。

按此了解測試詳細
https://www.av-test.org/en/antivirus/business-windows-client/windows-10/june-2022/

關於Version 2
Version 2 是亞洲最有活力的IT公司之一,公司發展及代理各種不同的互聯網、資訊科技、多媒體產品,其中包括通訊系統、安全、網絡、多媒體及消費市場產品。透過公司龐大的網絡、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括中國大陸、香港、澳門、臺灣、新加坡等地區,客戶來自各行各業,包括全球1000大跨國企業、上市公司、公用機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

關於ESET
ESET成立於1992年,是一家面向企業與個人用戶的全球性的電腦安全軟件提供商,其獲獎產品 — NOD32防病毒軟件系統,能夠針對各種已知或未知病毒、間諜軟件 (spyware)、rootkits和其他惡意軟件為電腦系統提供實時保護。ESET NOD32佔用 系統資源最少,偵測速度最快,可以提供最有效的保護,並且比其他任何防病毒產品獲得了更多的Virus Bulletin 100獎項。ESET連續五年被評為“德勤高科技快速成長500 強”(Deloitte’s Technology Fast 500)公司,擁有廣泛的合作夥伴網絡,包括佳能、戴爾、微軟等國際知名公司,在布拉迪斯拉發(斯洛伐克)、布裏斯托爾(英國 )、布宜諾斯艾利斯(阿根廷)、布拉格(捷克)、聖地亞哥(美國)等地均設有辦事處,代理機構覆蓋全球超過100個國家。

Introducing the Keepit mobile app

I promised myself I wouldn’t spend any time in this post talking about how the world has changed because of COVID or how people now want / expect / need to be able to do the critical parts of their job from wherever they are, not just from a corporate device on a managed corporate network. So, I won’t.

Instead, let me focus on one specific use case: backup and recovery of Office 365 data. Of course, that’s a huge part of what we do at Keepit, and our customers love it. So do analysts. We all know that disasters can strike at any time—ransomware, human errors, and technical failures can leave you in need of recovery at any time of the day or any day of the year. In the old-school world, starting a recovery meant “drive to the data center, put a tape in the tape library, and then run backup software.” With a cloud-native data protection solution like Keepit, there’s no more driving and no physical tapes, but you still have to start the restore.

That’s where our mobile app comes in! You can check the status of your backup and restore jobs and start recoveries from anywhere your mobile device can get a connection! Let’s take a look at how this works.

Checking Job Status

The Connectors page shows you what’s going on with the current set of supported connectors. Right now, the mobile app supports our Microsoft 365 and Google Workspace connectors, and we’re adding support for our other popular connectors. The connector status page shows you the current size and run state of your connectors. You can see in the example below that I have a current backup using the M365 connector and a separate OneDrive-only backup that just finished its first update.

Restoring Data

One of the unique ways Keepit makes your restores faster is by giving you multiple ways to restore data. You can restore data to its original location (“in-place restore,”) to an alternate location, or via a sharable URL. For the fastest possible restore, just create a shared restore link and send it to whoever needs instant access to the data. The recipient can use that link to browse the backup data you’ve chosen to give them and download only what they need, to whatever device or environment works best for them—without having to wait for you or Office 365 to complete the entire restore.

The Keepit mobile app supports both in-place and shared-URL restores. Tapping the connector lets you quickly create a link that points to the most recent snapshot, but if you want to browse the contents of the snapshot, you can do that too—tap the connector, choose “Open Connector,” and browse until you find the data you need. You can filter and sort the results to make it easier to quickly locate your data items. Once you’ve found what you’re looking for, you can restore it in-place or generate a link to send to the recipient for direct access.

The Future

We’re excited to be the first cloud SaaS data protection solution with a full-featured mobile app, and we have a lot of exciting things planned for the future. (Vic, let’s talk about what you’d like to publicly disclose here). We’re always looking for feedback from our customers, too—you can get the app from the Apple App Store or Google Play Store, and we’d love to hear what you think!

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Keepit
At Keepit, we believe in a digital future where all software is delivered as a service. Keepit’s mission is to protect data in the cloud Keepit is a software company specializing in Cloud-to-Cloud data backup and recovery. Deriving from +20 year experience in building best-in-class data protection and hosting services, Keepit is pioneering the way to secure and protect cloud data at scale.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×