HomeNewsIndia News5 IoT networking security mistakes

    5 IoT networking security mistakes

    According to a 2018 report from Symantec, IoT devices have experienced a whopping 600% increase in cyber-attacks year-over-year. It’s not too surprise, though—hardware and software flaws have contributed to the proliferation of enterprise security incidents. That said, human error should not be overlooked.

    In a recent article for Network World, Robert Burnett, Brother’s director of B2B products and solutions, summarized the five most common networking mistakes that companies make which lead to being open to malicious activity.

    1. Using default credentials

    Securing devices from unauthorized admin access not only helps protect important machine-configuration settings and report information, Burnett explains, it also prevents access to personal information like user names which, in turn, could be used in phishing attacks.

    1. Inadequate end-user awareness

    Taking the time to train your team of best practices for managing documents and devices should be part of everyone’s security plan. While you might have the latest and greatest in IoT security software, it will not eliminate human error like leaving important documents on the printer, or scanning documents to the wrong destination.

    1. Lack of access controls

    In the past, cost control was the driving force behind managing who can use a machine and when their jobs are released. While this is still important, security is fast becoming the biggest reason to put management controls on all devices.

    1. Failing to update device firmware

    Most IT pro’s spend their days keeping network infrastructure devices up and running, and ensuring the company’s infrastructure is both secure and efficient. One thing that is often overlooked are common devices like printers. And out-of-date firmware on these devices could expose the company’s infrastructure to new threats.

    1. Poor endpoint visibility

    It is of paramount importance to understand who is using what device, as well as the capabilities of all devices in a given fleet. In addition, one must constantly review these devices using port scanning, protocol analysis and other detection techniques as part of an overall security review.

    ELE Times Research Desk
    ELE Times Research Deskhttps://www.eletimes.ai
    ELE Times provides a comprehensive global coverage of Electronics, Technology and the Market. In addition to providing in depth articles, ELE Times attracts the industry’s largest, qualified and highly engaged audiences, who appreciate our timely, relevant content and popular formats. ELE Times helps you build awareness, drive traffic, communicate your offerings to right audience, generate leads and sell your products better.

    Related News

    Must Read

    New LX4580 – Highly Integrated 24‑Channel Mixed‑Signal IC for Aviation & Defence Actuation Systems

    Microchip Technology announces the LX4580, a 24‑channel mixed‑signal IC designed...

    TI redoubles advancement of next-gen physical AI with NVIDIA

    Texas Instruments announced accelerating the safe deployment of humanoid...

    Everspin Advances High-Reliability xSPI MRAM Portfolio With Complete Production Qualification for 64Mb MRAM

    Everspin Technologies, the world’s leading developer and manufacturer of...

    R&S acquires SRS, specialists in SDR communications solutions

    Rohde & Schwarz acquired Software Radio Systems (SRS), a...

    Differentiating Between LPDDR6, LPDDR5, and LPDDR5X

    Courtesy: Synopsys Advances in memory standards are driving faster and...

    Arrow Electronics and Infineon introduce 240W USB-C PD 3.2 reference design for battery-powered motor control applications

    Arrow Electronics and Infineon Technologies AG have announced REF_ARIF240GaN, a...

    Robotics Engineering: The Architectural Evolution Behind IT–OT Convergence

    Factories today operate as dense mechanical ecosystems, whether in...

    How AI Is Transforming Network Protocol Testing in Software-Defined Networks?

    As enterprises accelerate toward cloud-native infrastructure, edge computing, and...

    What is Fashion Tech? Providing New Product Value and Customer Experiences with Technology

    Courtesy: Murata Electronics What is fashion tech? - diverse technologies...