Internet of Things security is presenting governments and businesses with an unprecedented challenge. Consequently, a largely divided U.S. Congress identified it as a bipartisan issue ready for legislation. Last month, both houses of Congress passed the Internet of Things Cybersecurity Improvement Act recognizing IoT security as a matter of national security.
Despite all this attention, IoT deployments are still getting breached. In a recent episode, a set of IoT devices (camera with a doorbell) were found sending user credentials to China. The number of IoT-focused attacks hit an all-time high this year underscoring the need for action at all levels. Critical infrastructure components such as industrial control systems (ICS), safety systems, video surveillance systems, and asset tracking systems are now being attacked frequently to enter IT systems to steal data through laterally moving malware.
As the Christmas gifting season appears on the horizon, a new wave of cyberattacks will emerge harnessing gifted connected devices that are less secure. Guess where your stolen data could end up?
Such episodes will repeat till such a time that we prioritize IoT security and embed it by default in every activity from inception.
Subex Secure is here to help
We are today offering critical infrastructure grade security to our customers across the globe. With Subex Secure, you can afford to focus on your core business goals while we protect your assets, data, and infrastructure. Yes, our offerings can go a long way in helping you get more out of your IoT investments without worrying about security. Anything else is a compromise.
Read our latest threat landscape report to learn about cyber threats you need to know about.
Proof of value: How we helped a leading manufacturer improve their cybersecurity posture and avoid such threats.
Prayukth K V has been actively involved in productizing and promoting cross eco-system collaboration in the emerging tech and cybersecurity domains for over a decade. A marketer by profession and a published author, he has also proposed and promoted critical infrastructure protection strategies that rely on in-depth threat research and deflection strategies to deceive hackers and malware. Having been at the frontlines of cyber securing infrastructure, Prayukth has seen cyberattacks and defence tactics at close quarters.