CIOAdvisor Apac

  • Home
  • Vendors
  • News
  • Conference
  • Whitepapers
  • Newsletter
  • Subscribe
  • About Us
  • Specials

  • Menu
      • Ad Management
      • Application Security Testing
      • Artificial Intelligence
      • BPO
      • Contact Center
      • Data Analytics
      • Deep Learning
      • Digital Marketing
      • Digital Transformation
      • Disaster Recovery Services
      • Disinfection and Sanitization
      • E-Invoicing
      • Ecommerce
      • Govt Tech
      • HubSpot
      • Human Resource
      • ICT
      • IoT
      • Laser and Photonics
      • Leadership Development
      • Logistics
      • Machine Learning
      • Marketing Technology
      • Mobile Application
      • Parking Management
      • Payment And Card
      • SDN
      • Telecom
  • Digital Transformation
  • Logistics
  • IoT
  • Payment And Card
  • Artificial Intelligence
Specials
  • Specials

  • Ad Management
  • Application Security Testing
  • Artificial Intelligence
  • BPO
  • Contact Center
  • Data Analytics
  • Deep Learning
  • Digital Marketing
  • Digital Transformation
  • Disaster Recovery Services
  • Disinfection and Sanitization
  • E-Invoicing
  • Ecommerce
  • Govt Tech
  • HubSpot
  • Human Resource
  • ICT
  • IoT
  • Laser and Photonics
  • Leadership Development
  • Logistics
  • Machine Learning
  • Marketing Technology
  • Mobile Application
  • Parking Management
  • Payment And Card
  • SDN
  • Telecom
×
#

CIO Advisor APAC Weekly Brief

Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from CIO Advisor APAC

Subscribe

loading
  • Home
  • News
Editor's Pick (1 - 4 of 8)
left
IoT: Enabling the Safer, Connected Warehouse

Steve Walker, CIO & COO, DHL Supply Chain Asia Pacific

IOT-Turning out to be a phase of evolution

Mayank Bhargava, CIO, DHFL Pramerica Life Insurance

Connecting dots the IoT way!

Sunil Singh, Regional Chief Information Officer, Coca-Cola Beverages Vietnam

Industrial Scientific Blazes a Trail in IoT

David DiLeo, CIO, Industrial Scientific Corporation

How Internet of Things (IoT) will Rewire Supply Chains

Chad Lindbloom, CIO, C.H. Robinson

What's The CIO Got To Do With The IoT?

Sharon Gietl, VP of Information Technology and CIO, The Doe Run Company

The Internet of Things, in the Real World

Manuel Bautista, CIO, Harvard Maintenance

IoT Platforms: What are they and do you need one?

Tekin Gülşen, CIO, IT Director, Brisa Bridgestone Sabancı

right

THANK YOU FOR SUBSCRIBING

Five Challenges of IoT Security and How to Overcome Them

CIOAdvisor Apac | Wednesday, September 15, 2021
Tweet

Five Challenges of IoT Security and How to Overcome ThemIoT security has many challenges, but no single security strategy can protect against all threats.

FREMONT, CA: IoT security is the specific asset inventory, visibility, and control of internet-connected devices to a computing system, mechanical and digital machine, or objects that allow for the replacement or collection of data. IoT security strategies are pretty similar to traditional network security strategies in some ways. Still, the sensitivity of the data collected by IoT devices and the systems they manage raises the stakes of IoT security. An Internet of Things device that can shut down a power plant or collect video of a family inside their home necessitates more security controls than a traditional PC or laptop.

Five challenges of IoT Security:

Shadow devices

Top 20 IoT Companies - 2018A major IoT security challenge is shadow devices or devices that are connected to an unknown IoT network . Users who don't know any better, such as an employee who brings an IoT temperature monitor into the office, may add shadow devices to the network. They could also be used by malicious parties, such as attackers looking to conduct industrial espionage using unsecured conference room phones or smart televisions.

Unreliable software updates

IoT devices are not adequately updated to protect against new security vulnerabilities frequently. For starters, IoT devices are typically small and deployed in remote locations. With thousands of IoT devices to manage, it is easy for organizations to deploy IoT devices and then forget about them. Furthermore, many IoT devices rely on users to update the software, and many users either don't bother or are unaware that they are required to do so.

Application programming interface(API) challenges

Because exchanging data over the network through an application programming interface (API) is a necessary part of what IoT devices do, API vulnerabilities pose a significant IoT security risk. If an API flaw is discovered, attackers can exploit it to apprehend data via Man-in-the-Middle (MITM) attacks or seize command of devices to launch Distributed-Denial-of-Service (DDoS) attacks. There are many IoT APIs from various providers to track, and there is no single set of API vulnerabilities to monitor. Security teams must be fully aware of all possible risks in the APIs they use.

Default IoT passwords

Several IoT devices come with default passwords that allow users to access the software environments contained within the devices. If users fail to change their passwords, attackers with records of default IoT passwords can use them to obtain unapproved access to a device and its network.

Setting standards

There is no centralized standard to govern the design of IoT devices, the types of software they run, or how they exchange data, just as there is no unified standard to control the layout of IoT APIs. Instead, there is a slew of competing approaches that are constantly evolving alongside IoT hardware and software.

It isn't easy to protect IoT devices because there are several security challenges. There isn't a single security strategy that can protect all IoT devices or networks from all threats.

See Also: Top IoT Companies

tag

inventory

Featured Vendors

  • MVI Technologies: Innovative, Future-proof Financial and Payment Switching
    MVI Technologies: Innovative, Future-proof Financial and Payment Switching
  • DATAMARK: Process Driven Solutions in Action
    DATAMARK: Process Driven Solutions in Action
  • IMACREA: Shaping the Future of Teleworking
    IMACREA: Shaping the Future of Teleworking
  • PuzzleBox BPO, Inc.: A Hybrid Platform for Customer Support and Sales Empowerment
    PuzzleBox BPO, Inc.: A Hybrid Platform for Customer Support and Sales Empowerment
ON THE DECK

Read Also

Safeguarding Quality through Proactive Risk Management

Cultivating a Culture of Agility: Nurturing Adaptability for Organizational Success

Governance for Smarter KPIs: Enhancing Performance Measurement

Embracing the Irreplaceable Human in Business and Beyond

Leveraging Gamification for Deeper Financial Engagement

Generative AI: The Game-Changer Automates Marketing For The Retail Industry

Loading...

I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

Copyright © 2025 CIO Advisorapac. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy Policy |  Sitemap

follow on linkedinfollow on twitter
This content is copyright protected

However, if you would like to share the information in this article, you may use the link below:

https://www.cioadvisorapac.com/news/five-challenges-of-iot-security-and-how-to-overcome-them-nwid-2653.html