x
Security and Trust Issues in IoT
IoT NewsTech News save
H
Posted

media

No media yet. 

details

COVID-19 normalized working from home across a number of industries, which has been welcome news for many. However, one of the unintended consequences of the switch to the home office has been a huge increase in security threats. A survey from Atlas VPN suggests that almost 80 percent of businesses worldwide have suffered from increased security breaches as a result of staff working remotely.

Such is the impact of ransomware that Mandiant, one of the market leaders in resolving issues caused by attacks, are swamped with demand for its services and can no longer cope with it, as their CTO revealed in an interview with NBC News.

While security has always been a consideration for many enterprises, it has not been the number one priority, with security considerations often being added in the developmental stage. However, with the past decade showing a massive increase in malware attacks (up 6500 percent), a change must be made.

Security Issues in IoT
The IoT industry is predicted to expand exponentially in the coming years but cannot possibly continue to exist without putting in place reliable end-to-end security measures. The IoT market is so diverse that a flexible security framework and light-touch regulation are necessary in order to guarantee the security of the market, while also encouraging growth and successful development.

It is quite paradoxical that securing IoT has proven such an impossible task when doing so seems fundamental to its functioning. Until recently, legislation on-device security has been inconsistent geographically, with different laws introduced in different states and countries.

IoT also brings its own set of peculiar challenges. The variety in IoT devices is great, and many are small in size and memory capacity. As a result, these devices lack the complex processing capabilities necessary to support cryptographic functionality, and, in some cases, their operating systems cannot be updated to cope with new threats.

Read More.

No comments yet.

Commenting is limited to those invited by others in the community
or learn more.

x

Add to Collection