• Welcome to the Online Discussion Groups, Guest.

    Please introduce yourself here. We'd love to hear from you!

    If you are a CompTIA member you can find your regional community here and get posting.

    This notification is dismissable and will disappear once you've made a couple of posts.
  • We will be shutting down for a brief period of time on 9/24 at around 8 AM CST to perform necessary software updates and maintenance; please plan accordingly!

Brianna White

Administrator
Staff member
Jul 30, 2019
4,655
3,454
After a record year in 2020, cyberattacks continue to escalate in severity, frequency, and sophistication. It’s a challenge exacerbated by the rapid expansion of the Internet of Things (IoT), an ecosystem that includes everything from cloud-based operations and sensor technology to a plethora of devices. According to Forbes, the number of IoT connections could hit 30 billion by 2025. That’s a vast -- and growing -- attack surface, one that 77 percent of organizations are facing without an incident response plan. Alas, there are no foolproof precautions, but you can increase your cyber resilience and make yourself less of a target.
Securing the Internet of Things
In our rush to adopt new digital technologies, many businesses overlook the necessary security measures that will enable them to benefit from all their data and connectivity while minimizing the risks. Rest assured, opportunities for hackers to penetrate your critical infrastructure exist right across the spectrum, from outdated hardware and VPNs to crypto storage and tracking updates and patches. Let’s take a look at six common points of entry and how to mitigate the risk they pose.
1. Hardware Errors and Vulnerabilities
One huge challenge facing hardware is the inherent vulnerabilities within processors exploited to carry out attacks by injecting malicious code into trusted devices. Spectre is a security vulnerability affecting processors on desktops, laptops, smartphones, and cloud servers. It takes its name from “speculative execution,” which enables processors to predict instructions, prep the resulting path, and fetch commands from memory. By breaking the isolation between applications, Spectre “tricks” programs into leaking sensitive data, including passwords, via a side channel.
Continue reading: https://tdwi.org/articles/2021/10/27/dwt-all-addressing-6-iot-security-weak-spots.aspx
 

Attachments

  • p0005505.m05170.security5.jpg
    p0005505.m05170.security5.jpg
    221.7 KB · Views: 41
  • Like
Reactions: Brianna White