• About
  • Advertise
  • Contact
Monday, June 16, 2025
No Result
View All Result
NEWSLETTER
iottennessee
  • Home
  • Internet of Things
  • Security
  • Uncategorized
  • Mobile
  • Networking
  • WAN
  • Cloud Computing
  • Data Centers
  • Technology Industry
  • Hardware
  • Home
  • Internet of Things
  • Security
  • Uncategorized
  • Mobile
  • Networking
  • WAN
  • Cloud Computing
  • Data Centers
  • Technology Industry
  • Hardware
No Result
View All Result
iottennessee
No Result
View All Result
Home Internet of Things

5 key enterprise IoT security recommendations

in Internet of Things
0
5 key enterprise IoT security recommendations
0
SHARES
5
VIEWS
Share on FacebookShare on Twitter

Not so long ago, the phrase “consumerization of IT” was on everyone’s lips. Whole publications and conferences (remember CITE, for Consumerization of IT in the Enterprise?) were created to chronicle the trend of corporations relying on products and services originally created for consumers — which was often easier to use and of higher quality than its business-oriented competitors.

Well, no one talks much about the consumerization of IT anymore… not because the trend went away, but because consumer tech has now permeated every aspect of business technology. Today, it’s just how things work — and if you ask me, that’s a good thing.

The consumerization of enterprise IoT

But now, in 2018, a variation of the concept is returning in the world of IoT, and it’s raising many of the same concerns around reliability and, especially, security.

It turns out that in addition to the “enterprise grade” Internet of Things (IoT) devices they buy, corporate IT teams also have to deal with “consumer-grade” devices that may enter the company via a variety of channels, from non-IT company purchases to staff members bringing them in on their own. Examples include smart TVs, thermostats, smart speakers, fitness trackers, video cameras … basically anything connected to the company network that isn’t a computer, a phone, or a router.

Not surprisingly, these devices often lack the comprehensive security features more commonly found on IoT products designed for enterprise use.

Worse, perhaps, IT teams may not even be aware that these devices are being connected to their networks, much less be able to plan for their security.

Online Trust Alliance IoT device checklist

To help enterprises cope with these new vulnerabilities, the Online Trust Alliance, now an Internet Society initiative, has developed a checklist for dealing with these “consumerization of IoT” devices in enterprise environments.

The OTA warns:

Many have a simple or non-existent user interface, default (or hardcoded) passwords, open hardware and software ports, limited local password protection, lack the ability to be updated, “phone home” frequently, collect more data than expected and use insecure backend services.

The consequences of using these devices range from unauthorized access to other enterprise systems, to surveillance via audio, video and data, to use of those devices to attack other connected devices or services.

According to the OTA, enterprises must “fully consider the possible risks introduced by these devices, understand that IoT devices are likely more vulnerable than traditional IT devices, educate users on IoT device risks, and strike a balance between controlling IoT devices vs. creating “shadow IoT.” (That’s another buzz phrase that you don’t hear as much about these days.)

Key IoT security checklist items

Doing all that is hardly trivial, so while you can download a PDF of the entire checklist here, it’s worth calling out some of the key best practices. In addition to fairly obvious ones, such as products with hard-coded passwords, the checklist includes more-substantive advice:

  • Relegate IoT devices to a “separate, firewalled, monitored network,” just as you would in guest networks. “This allows you to restrict incoming traffic, prevent crossover to your core network, and profile traffic to identify anomalies.”
  • Turn off stuff that’s not being used. That may seem obvious, but the checklist also recommends the “physical blocking/covering of ports, cameras, and microphones.”
  • Ensure that people can’t physically access these IoT devices to reset the passwords, etc.
  • Enable encryption whenever possible, and consider allowing only devices that support encryption to connect to your networks. If that’s not possible, “consider using a VPN or other means to limit data exposure.”
  • Keep firmware and software updated (via automatic updates or monthly checks). Avoid products that cannot be updated, follow the lifecycle of all devices, and remove them from service when they are no longer updatable or secure.

IoT security continues to evolve, and checking off every item on the OTA list won’t provide complete protection. But these are straightforward best practices that can help mitigate the risk. Ignore them at your peril.

Join the Network World communities on Facebook and LinkedIn to comment on topics that are top of mind.
Download Premium WordPress Themes Free
Free Download WordPress Themes
Download Nulled WordPress Themes
Download WordPress Themes
lynda course free download
download huawei firmware
Free Download WordPress Themes
free download udemy course
Tags: Internet of ThingsSecurity
Next Post
10 tips to minimize IoT security vulnerabilities

10 tips to minimize IoT security vulnerabilities

Recommended

The Gearhead Raspberry Pindex

The Gearhead Raspberry Pindex

Cisco-Jasper deal should make enterprise IoT safer

Facebook Twitter Youtube RSS

Newsletter

Subscribe our Newsletter for latest updates.

Loading

Category

  • Careers
  • Cloud Computing
  • Data Center
  • Data Centers
  • Databases
  • Hardware
  • Infrastructure
  • Internet of Things
  • IT Leadership
  • Mobile
  • Networking
  • Open Source
  • Security
  • Software
  • Software Development
  • Technology Industry
  • Uncategorized
  • Unified Communications
  • Virtualization
  • WAN

About Us

Get updated with latest IOT related news and information with us.

© 2019-20 iottennessee.com.

No Result
View All Result
  • Home
  • Internet of Things
  • Security
  • Uncategorized
  • Mobile
  • Networking
  • WAN
  • Cloud Computing
  • Data Centers
  • Technology Industry
  • Hardware

© 2019-20 iottennessee.com.

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In