HomeNewsIndia News5 IoT networking security mistakes

    5 IoT networking security mistakes

    According to a 2018 report from Symantec, IoT devices have experienced a whopping 600% increase in cyber-attacks year-over-year. It’s not too surprise, though—hardware and software flaws have contributed to the proliferation of enterprise security incidents. That said, human error should not be overlooked.

    In a recent article for Network World, Robert Burnett, Brother’s director of B2B products and solutions, summarized the five most common networking mistakes that companies make which lead to being open to malicious activity.

    1. Using default credentials

    Securing devices from unauthorized admin access not only helps protect important machine-configuration settings and report information, Burnett explains, it also prevents access to personal information like user names which, in turn, could be used in phishing attacks.

    1. Inadequate end-user awareness

    Taking the time to train your team of best practices for managing documents and devices should be part of everyone’s security plan. While you might have the latest and greatest in IoT security software, it will not eliminate human error like leaving important documents on the printer, or scanning documents to the wrong destination.

    1. Lack of access controls

    In the past, cost control was the driving force behind managing who can use a machine and when their jobs are released. While this is still important, security is fast becoming the biggest reason to put management controls on all devices.

    1. Failing to update device firmware

    Most IT pro’s spend their days keeping network infrastructure devices up and running, and ensuring the company’s infrastructure is both secure and efficient. One thing that is often overlooked are common devices like printers. And out-of-date firmware on these devices could expose the company’s infrastructure to new threats.

    1. Poor endpoint visibility

    It is of paramount importance to understand who is using what device, as well as the capabilities of all devices in a given fleet. In addition, one must constantly review these devices using port scanning, protocol analysis and other detection techniques as part of an overall security review.

    ELE Times Research Desk
    ELE Times Research Deskhttps://www.eletimes.ai
    ELE Times provides a comprehensive global coverage of Electronics, Technology and the Market. In addition to providing in depth articles, ELE Times attracts the industry’s largest, qualified and highly engaged audiences, who appreciate our timely, relevant content and popular formats. ELE Times helps you build awareness, drive traffic, communicate your offerings to right audience, generate leads and sell your products better.

    LEAVE A REPLY

    Please enter your comment!
    Please enter your name here

    Related News

    Must Read

    ECMS applications make history, cross Rs. 1 lakh crore in investment applications

    Union Minister for Electronics and IT Ashwini Vaishnaw announced...

    AI-Driven 6G: Smarter Design, Faster Validation

    Courtesy: Keysight Technologies Key takeaways: Telecom companies are hoping...

    Scaling up the Smart Manufacturing Mountain

    Courtesy: Rockwell Automation A step-by-step roadmap to adopting smart manufacturing...

    STMicroelectronics’ new GaN ICs platform for motion control boosts appliance energy ratings

    STMicroelectronics unveiled new smart power components that let home...

    Keysight Hosts AI Thought Leadership Conclave in Bengaluru

     Keysight Technologies, Inc. announced the AI Thought Leadership Conclave, a...

    Government approves 17 projects worth Rs. 7,172 crore under ECMS

    The Ministry of Electronics and IT announced for the...

    BD Soft strengthens cybersecurity offerings for BFSI and Fintech businesses with advanced solutions

    BD Software Distribution Pvt. Ltd. has expanded its Managed...

    Advancing Quantum Computing R&D through Simulation

    Courtesy: Synopsys Even as we push forward into new frontiers...

    Overcoming BEOL Patterning Challenges at the 3-NM Node

    Courtesy: Lam Research ● Controlling critical process parameters is key...