NYC area cyber security consultant reviews Internet of Things (IoT) cyber security risks and recommends a careful approach to improve device security—in a new article from eMazzanti Technologies
HOBOKEN, N.J., July 20, 2022 /PRNewswire-PRWeb/ -- A NYC area cyber security consultant and managed services provider (MSP) offers a deliberate approach to IoT cyber security in a new article on the eMazzanti Technologies website. The informative article first reviews the inherent risks of operating numerous IoT devices, including an increased attack surface.
The author then urges readers to identify all connected devices including patching status. He also advocates that network administrators assign unique identities to each device and update passwords. He concludes with advice about idle devices, physical security, and continuous monitoring.
"Connected IoT devices gather and share immense amounts of data," stated Almi Dumi, CISO, eMazzanti Technologies. "But the seemingly limitless opportunities for innovation also bring significant risk."
Below are a few excerpts from the article, "IoT Cyber Security Requires a Deliberate Approach Due to Inherent Risks."
IoT Brings Inherent Risks
"From recent IoT cyber security news, we learn that a white hat hacker used Bluetooth to hack into a Tesla Model X in under two minutes. And, hackers attacked video surveillance company Verkada, compromising 150,000 active surveillance cameras, many in secure locations."
Identify Connected Devices and Update Status
"First, take an inventory of devices across the IoT infrastructure. Understand what they do and identify older models that may present increased security challenges. The initial inventory process can take some time, but it allows organizations to classify devices more easily for risk management."
Assign Unique Identities and Credentials
"Devices typically come with default device names and passwords. Too often, organizations leave the default credentials in place, leaving devices and the network vulnerable to hackers. Make sure that each device and system has a distinctive identity."
Deactivate Idle Devices and Features
"Each new device and each feature on the device add more access points for attackers to exploit. Conduct a regular review of devices and disable any devices or features not used regularly. Likewise, when purchasing new devices, keep security in mind. For instance, unless you need a USB port, avoid purchasing a device that includes one."
Partner with IoT Cyber Security Experts
The security experts at eMazzanti Technologies understand the challenges that organizations face when implementing IoT solutions. The company's network security solutions include automated network mapping and inventory, as well as round-the-clock monitoring. From access management to encryption and more, they provide robust security to counter modern threats.
Have you read it?
Ensure Cyber Security Readiness with a Midsummer Fitness Checkup
Current Malware and Security Breaches and How to Defend Against Them
About eMazzanti Technologies
eMazzanti's team of trained, certified IT experts rapidly deliver increased revenue growth, data security, and productivity for clients ranging from law firms to high-end global retailers, expertly providing advanced retail and payment technology, digital marketing services, cloud, and mobile solutions, multi-site implementations, 24×7 outsourced network management, remote monitoring, and support.
eMazzanti has made the Inc. 5000 list 9X, is a 4X Microsoft Partner of the Year, the #1 ranked NYC area MSP, NJ Business of the Year, and 5X WatchGuard Partner of the Year! Contact: 1-866-362-9926, [email protected] or http://www.emazzanti.net Twitter: @emazzanti Facebook: Facebook.com/emazzantitechnologies.
Media Contact
Kent D Sorensen, eMazzanti Technologies, 14803345403, [email protected]
SOURCE eMazzanti Technologies
Share this article