Intelligent CIO Africa Issue 17 | Page 39

////////////////////////////////////////////////////////////////////////// of Service attacks. We’ve seen cases like the infamous Mirai attack, which planted malware onto connected surveillance cameras, routers and digital video recorders, and used them to launch well-orchestrated attacks. A compromised device on a network can also serve as a beachhead, a location from which an adversary can quietly gather intelligence and initiate attacks on the local network. To mitigate these risks, IoT manufacturers should specify what security measures they www.intelligentcio.com FEATURE: IOT enforce, have strong passwords and have been through thorough security audits. They should be able to receive automated over-the-air updates to address any security vulnerability discovered. They should be treated as a separate class of device, situated on isolated network segments within the business or the home. Most IoT devices have no need to connect to other computers on the network. So, by restricting access, we can avoid exposing other computing assets unnecessarily. Reinhardt van Rooyen, Innovation Strategist at Jasco INTELLIGENTCIO 39