Breaking News

Do you know, IOT devices are new Trojan Horses, Here is How to secure them ?




At this time, your vacuum cleaner can be removed for your home or office. Many robotic vacuoles are IoT devices that can be easily hacked, allowing a thief to use the camera to position the joints.

"We are at a weak crossroads with the Internet of Things (IoT)," said Robert Falzone, head of engineering technologies at Check Point Software, at a recent ITWC webinar. He said that by 2025 there will be 85 billion devices worldwide.

"We're now seeing more than 127 IoT devices per second. It gives you a break to think about how to handle it," he said. IoT devices are easy targets for hackers. They come with ready-to-use security flaws, like default passwords. , And are often inaccurate.

The devices are widely used in manufacturing to healthcare and, increasingly, are connected to the Internet. "It was done to save costs, but it represents a great risk," Falzone said. Why IoT Security. One challenge: The biggest challenge is the scope to manage the security of IoT devices, Falzone said. For example, a hospital may have more than 25,000 devices. Platform diversity is another common problem.

"There are many types of products that you may not have. Learn about IoT," Falzone said. These can range from thermostats to light bulbs. A difficult factor is that many devices, such as those in the hospital, are critical to the operation. Traditional devices did not work because the vulnerabilities were low. . "Many devices are manufactured very quickly, and as a result, we don't even know the embedded risks," Falzone explained. Increasingly, new vulnerabilities are developing, making it very difficult for legacy solutions to detect them.

"These things are killing so fast that no one has the ability to identify what they are," Falzone said. Finally, organizations struggle to hire the talented professionals needed to bridge the gap between IoT devices and cyber security.

An automated solution To solve these challenges, a solution must be designed from the beginning with IoT, because it is a unique environment, said Falzone. Given the scale of the problem, an automated solution is needed. "Without an integrated automatic system, you're dead before you start. There is no way to manage it. "The first step is to perform a risk assessment to automatically discover all IoT devices in an environment and the associated risks."

Knowledge is power, "Falzone said. Second, security policies are automatically based on device risk categories. It can be implemented as critical or non-critical." We apply the same approach we use for offices, "Falzone said." We have a very high security capacity that we can support. A well-implemented policy is the best weapon. "Falzone described a scenario in a hospital where, overnight, a maintenance team can install smart light bulbs with Wi-Fi access points."

"There is a significant risk," he said. "The idea is that the devices do not wait to be unprotected. Instead, the control point has a solution in which the bulb is automatically detected and a security policy is applied. Finally, the nanobots of the checkpoint must be sent to the device. Integrates for protection against attacks "Detects when a device is vulnerable and applies virtual fixes before problems occur," he said. "This is a significant change in IoT security," Falzone said. "Add real-time policies and security to all devices. It makes a huge difference. "

No comments