//////////////////////////////////////////////////////////////////////////
of Service attacks. We’ve seen cases like
the infamous Mirai attack, which planted
malware onto connected surveillance
cameras, routers and digital video recorders,
and used them to launch well-orchestrated
attacks. A compromised device on a
network can also serve as a beachhead,
a location from which an adversary can
quietly gather intelligence and initiate
attacks on the local network.
To mitigate these risks, IoT manufacturers
should specify what security measures they
www.intelligentcio.com
FEATURE: IOT
enforce, have strong passwords and have
been through thorough security audits.
They should be able to receive automated
over-the-air updates to address any security
vulnerability discovered. They should be
treated as a separate class of device,
situated on isolated network segments
within the business or the home. Most IoT
devices have no need to connect to other
computers on the network. So, by restricting
access, we can avoid exposing other
computing assets unnecessarily.
Reinhardt van Rooyen, Innovation
Strategist at Jasco
INTELLIGENTCIO
39