HomeNewsIndia News5 IoT networking security mistakes

5 IoT networking security mistakes

According to a 2018 report from Symantec, IoT devices have experienced a whopping 600% increase in cyber-attacks year-over-year. It’s not too surprise, though—hardware and software flaws have contributed to the proliferation of enterprise security incidents. That said, human error should not be overlooked.

In a recent article for Network World, Robert Burnett, Brother’s director of B2B products and solutions, summarized the five most common networking mistakes that companies make which lead to being open to malicious activity.

  1. Using default credentials

Securing devices from unauthorized admin access not only helps protect important machine-configuration settings and report information, Burnett explains, it also prevents access to personal information like user names which, in turn, could be used in phishing attacks.

  1. Inadequate end-user awareness

Taking the time to train your team of best practices for managing documents and devices should be part of everyone’s security plan. While you might have the latest and greatest in IoT security software, it will not eliminate human error like leaving important documents on the printer, or scanning documents to the wrong destination.

  1. Lack of access controls

In the past, cost control was the driving force behind managing who can use a machine and when their jobs are released. While this is still important, security is fast becoming the biggest reason to put management controls on all devices.

  1. Failing to update device firmware

Most IT pro’s spend their days keeping network infrastructure devices up and running, and ensuring the company’s infrastructure is both secure and efficient. One thing that is often overlooked are common devices like printers. And out-of-date firmware on these devices could expose the company’s infrastructure to new threats.

  1. Poor endpoint visibility

It is of paramount importance to understand who is using what device, as well as the capabilities of all devices in a given fleet. In addition, one must constantly review these devices using port scanning, protocol analysis and other detection techniques as part of an overall security review.

ELE Times Research Desk
ELE Times Research Deskhttps://www.eletimes.ai
ELE Times provides a comprehensive global coverage of Electronics, Technology and the Market. In addition to providing in depth articles, ELE Times attracts the industry’s largest, qualified and highly engaged audiences, who appreciate our timely, relevant content and popular formats. ELE Times helps you build awareness, drive traffic, communicate your offerings to right audience, generate leads and sell your products better.

Related News

Must Read

Sasken Announces Hyderabad Center of Excellence to Scale Product Engineering and Digital Innovation

Hyderabad, India: April 16, 2026: Sasken Technologies Ltd. (BSE:...

Mission accomplished: Infineon technology proves reliable once again in space on Artemis II

Infineon's radiation-hardened semiconductors performed flawlessly on NASA's Artemis...

Bosch and Qualcomm expand collaboration to strategic ADAS solutions

Cockpit Computers: 10 million units delivered • High-performance solutions: Bosch...

Gartner Forecasts Worldwide Semiconductor Revenue to Exceed $1.3 Trillion in 2026

Semiconductor Revenue to Grow 64% in 2026 DRAM...

Directed Energy Systems: Where Capability Ends and Control Begins

by Sukhendu Deb Roy, Industry Consultant Key Takeaways The economics...

Boundary scan in combination with automotive applications for CAN-FD and LIN bus

Serial communication remains the backbone of electronic communication in...

Why Every EV & 5G Phone Could Soon Be Powered by Gujarat

In a move that cements India’s transition from a...