CIOAdvisor Apac

  • Home
  • Vendors
  • News
  • Conference
  • Whitepapers
  • Newsletter
  • Subscribe
  • About Us
  • Specials

  • Menu
      • Ad Management
      • Application Security Testing
      • Artificial Intelligence
      • BPO
      • Contact Center
      • Data Analytics
      • Deep Learning
      • Digital Marketing
      • Digital Transformation
      • Disaster Recovery Services
      • Disinfection and Sanitization
      • E-Invoicing
      • Ecommerce
      • Govt Tech
      • HubSpot
      • Human Resource
      • ICT
      • IoT
      • Laser and Photonics
      • Leadership Development
      • Logistics
      • Machine Learning
      • Marketing Technology
      • Mobile Application
      • Parking Management
      • Payment And Card
      • SDN
      • Telecom
  • Digital Transformation
  • Logistics
  • IoT
  • Payment And Card
  • Artificial Intelligence
Specials
  • Specials

  • Ad Management
  • Application Security Testing
  • Artificial Intelligence
  • BPO
  • Contact Center
  • Data Analytics
  • Deep Learning
  • Digital Marketing
  • Digital Transformation
  • Disaster Recovery Services
  • Disinfection and Sanitization
  • E-Invoicing
  • Ecommerce
  • Govt Tech
  • HubSpot
  • Human Resource
  • ICT
  • IoT
  • Laser and Photonics
  • Leadership Development
  • Logistics
  • Machine Learning
  • Marketing Technology
  • Mobile Application
  • Parking Management
  • Payment And Card
  • SDN
  • Telecom
×
#

CIO Advisor APAC Weekly Brief

Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from CIO Advisor APAC

Subscribe

loading
  • Home
  • News
Editor's Pick (1 - 4 of 8)
left
IoT: Enabling the Safer, Connected Warehouse

Steve Walker, CIO & COO, DHL Supply Chain Asia Pacific

IOT-Turning out to be a phase of evolution

Mayank Bhargava, CIO, DHFL Pramerica Life Insurance

Connecting dots the IoT way!

Sunil Singh, Regional Chief Information Officer, Coca-Cola Beverages Vietnam

Industrial Scientific Blazes a Trail in IoT

David DiLeo, CIO, Industrial Scientific Corporation

How Internet of Things (IoT) will Rewire Supply Chains

Chad Lindbloom, CIO, C.H. Robinson

What's The CIO Got To Do With The IoT?

Sharon Gietl, VP of Information Technology and CIO, The Doe Run Company

The Internet of Things, in the Real World

Manuel Bautista, CIO, Harvard Maintenance

IoT Platforms: What are they and do you need one?

Tekin Gülşen, CIO, IT Director, Brisa Bridgestone Sabancı

right

THANK YOU FOR SUBSCRIBING

Measures to Overcome IoT Risks

CIOAdvisor Apac | Wednesday, December 19, 2018
Tweet

Internet of Things (IoT) is a new age technology that is driving the modern day businesses and with the capabilities that it holds within itself, business efficiency got improvised. The connected devices hold a great value but also come with security risks that give rise to two way opinion on the use of technology. Some real-life risks are –

•  As there are many nodes in the network it increases the cyber attack surface.

•  Also, it is highly vulnerable to ransomware, where the person locks down the HVAC system, releases control only when paid through bitcoin.

•  Disrupted Services due to DDOS attack conducted by IoT botnets.

•  Currently, the IoT storage is centralized making it highly vulnerable to cyber attacks.

These threats are expected to accelerate with time as the IoT devices are spreading vastly in the industry and dependability on them is also increasing. Organizations need to take measures to overcome or at least minimize the risk; some of the measures could be –

•  Segmenting The Network: One of the methods could be to segment the networks, devices, and storage making it harder for attackers to reach the complete data. Even if a network faces security breach all the data is not at risk and the whole process does not go down. This also makes it easier for IT to detect the exact network that got disrupted.

•  Applying Security Profiles on IoT Devices: Unlike humans, IoT has constrained the number of hosts that they communicate with. Therefore, a whitelist filter could be applied which will deny all traffic unless it is specified to be with an authorized host improving the overall IoT security. Security regulations must be implemented to continuously monitor and restrict access activities.

•  Deep Analysis: Security threats can also be mitigated by analyzing the previous breaches. A proper analysis will allow predicting the network that gets attacked the most. An extra security layer can be then applied to such networks; also this would allow predicting networks that haven’t been attacked but have high chances.

Overcoming from the drawbacks of IoT makes it a great tool to enhance business efficiency and productivity. Every technology comes with pros and cons it depends on the organization to embrace which side of the coin keeping the other one in mind.

tag

Storage

cyber attack

Featured Vendors

  • MVI Technologies: Innovative, Future-proof Financial and Payment Switching
    MVI Technologies: Innovative, Future-proof Financial and Payment Switching
  • DATAMARK: Process Driven Solutions in Action
    DATAMARK: Process Driven Solutions in Action
  • IMACREA: Shaping the Future of Teleworking
    IMACREA: Shaping the Future of Teleworking
  • PuzzleBox BPO, Inc.: A Hybrid Platform for Customer Support and Sales Empowerment
    PuzzleBox BPO, Inc.: A Hybrid Platform for Customer Support and Sales Empowerment
ON THE DECK

Read Also

Safeguarding Quality through Proactive Risk Management

Cultivating a Culture of Agility: Nurturing Adaptability for Organizational Success

Governance for Smarter KPIs: Enhancing Performance Measurement

Embracing the Irreplaceable Human in Business and Beyond

Leveraging Gamification for Deeper Financial Engagement

Generative AI: The Game-Changer Automates Marketing For The Retail Industry

Loading...

I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

Copyright © 2026 CIO Advisorapac. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy Policy |  Sitemap

follow on linkedinfollow on twitter
This content is copyright protected

However, if you would like to share the information in this article, you may use the link below:

https://www.cioadvisorapac.com/news/measures-to-overcome-iot-risks-nwid-1154.html