› Forums › Security › News (Security) › Top 10 Risk-Reduction Strategies to Protect IoT Devices
Tagged: Security_S12
- This topic has 1 voice and 0 replies.
-
AuthorPosts
-
-
October 15, 2019 at 4:47 am #35414
#News(Security) [ via IoTGroup ]
Headings…
Top 10 Risk-Reduction Strategies to Protect IoT Devices
Cyber Security Services, an emerging cyber security consulting company, tod
Top 10 IoT Security Strategies
New Microsoft Report Reveals Increasing IoT Market Maturity, Partners ShareAuto extracted Text……
Cyber Security Services, an emerging cyber security consulting company, today released its top 10 strategies for securing IoT (Internet of Things) devices.
Now consider the fact that there are billions of business devices — from basic security cameras, HVAC systems, barcode readers, smart locks and smart lighting through more sophisticated building automation systems and industrial machines — all connected within the larger Internet of Things, or IoT.
We recommend that businesses establish and enforce procedures to change default passwords for every IoT device on the network.
Whenever possible, separate the corporate network from vendor-managed and unmanaged IoT devices.
This might include HVAC systems, security cameras, temperature control devices, electronic signage, smart televisions, media centers, security DVRs and NVRs, network-connected clocks, and network-connected lighting.
Use VLANs to separate and keep track of various IoT devices on the network.
Lastly, apply an Access Control List, or ACL, to VLANs or network access ports whenever possible to limit communication to the least amount that is required for device operation.
3. Prevent IoT devices from communicating with the internet unless absolutely necessary.
While it’s impossible to completely eliminate an IoT security threat, businesses can prevent IoT devices from communicating outside of the organization unless absolutely necessary.
4. Control which vendors are allowed remote access to IoT devices.
To improve IoT security, businesses can put controls in place to limit the number of vendors granted remote access to IoT devices.
A NAC solution with proper switch and wireless integrations can help an organization improve IoT security by detecting most devices and identifying rogue connections to the network.
It can also apply controls to the devices that are not authorized or granted merely limited access to the network
Read More..
AutoTextExtraction by Working BoT using SmartNews 1.0299999999 Build 26 Aug 2019
-
-
AuthorPosts
- You must be logged in to reply to this topic.