Getting alerts is only as good as the response to them. Without a response, they are just acting as a smoke screen for the penetrators. Those alerts should be converted into automatic actions of blocking, limiting access or quarantine of suspected devices. For blocking mechanism, the closer you do the blocking to the actual network infrastructure, like shutting down the actual Ethernet port, the more secure and affective you are.
How to approach keeping your IoT devices safe
-
by IoTNews
- Categories: Uncategorized
Related Content
What is edge computing and why does it matter?
By
IoTNews
September 3, 2024
What is IoT? The internet of things explained
By
IoTNews
June 15, 2021
IoT, edge computing, and AI pay off for asset-based enterprises
By
IoTNews
June 15, 2021
TCP/IP stack vulnerabilities threaten IoT devices
By
IoTNews
June 15, 2021
IoT helps make return-to-work safer
By
IoTNews
June 15, 2021