By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
TechgoonduTechgoonduTechgoondu
  • Audio-visual
  • Enterprise
    • Software
    • Cybersecurity
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
    • Cellphones
    • Tablets
  • PC
  • Telecom
Search
© 2023 Goondu Media Pte Ltd. All Rights Reserved.
Reading: Has adoption of “connected devices” outpaced security?
Share
Font ResizerAa
TechgoonduTechgoondu
Font ResizerAa
  • Audio-visual
  • Enterprise
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
  • PC
  • Telecom
Search
  • Audio-visual
  • Enterprise
    • Software
    • Cybersecurity
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
    • Cellphones
    • Tablets
  • PC
  • Telecom
Follow US
© 2023 Goondu Media Pte Ltd. All Rights Reserved.
Techgoondu > Blog > Cybersecurity > Has adoption of “connected devices” outpaced security?
CybersecurityEnterprise

Has adoption of “connected devices” outpaced security?

Techgoondu
Last updated: January 20, 2023 at 5:53 PM
Techgoondu
Published: January 19, 2023
5 Min Read
SHARE

Brought to you by Keysight Technologies

By Scott Register

ILLUSTRATION: Keysight Technologies

We’ve all seen the rush to deploy the new wave of connected devices, but the speed at which these devices have been embraced may threaten fundamental security protocols.

We love the convenience that ubiquitous connectivity brings us; our cars can reroute us based on traffic jams, we can adjust our lights or AC without leaving the couch, we can get up-to-the-minute blood glucose readings, and we can precisely monitor energy flow across a smart grid and optimise manufacturing with smart factory floors.

Aided by technologies such as Bluetooth Low Energy, Wi-Fi, and 5G, the pace of Internet of Things (IoT) deployment continues to accelerate.

However, in a recent Forrester report, 69 per cent of surveyed respondents estimate that at least half of all devices on their enterprise network or internet-of-things (IoT) are unmanaged, and 26 per cent estimate that unmanaged devices outnumber managed devices on their network by three to one.

Well, as with any new technology, there are going to be drawbacks. Among the most significant: our ability to build and deploy intelligent, connected devices has outpaced our understanding and practices of how to secure them.  

We’ve seen large botnets take over farms of IoT devices and shut down large chunks of the Internet, a recent escalation in healthcare organisations hit by ransomware attacks impacting connected medical devices, and privacy breaches impacting everything from baby monitors to smart watches.

Lessons for “connected device” security—Think like an attacker

IoT devices really are special. For traditional IT devices, like Linux servers and Windows laptops, we have established best practices for security. It isn’t perfect, but in reality, if we keep the operating system and any endpoint security software up to date, we’ll eliminate the majority of system vulnerabilities.

In fact, an analysis earlier in 2022 showed that flaws from 2017 and 2018 were still among the most commonly exploited today; a simple and free OS update would have blocked them.

IoT devices, however, are more often black boxes – we don’t know which version of what operating system they’re running, or which versions of what libraries, and even if we have that information, we can’t force an update; we typically have to wait for a patch from the manufacturer.

There are no standards or real consistency for tracking security flaws across connected devices; the only way we can understand where the problems are is to test them ourselves.

Then, armed with a better understanding of how IoT devices are impacting our attack surface, we can deploy targeted mitigation strategies to address the vulnerabilities we’ve discovered.

This is, of course, good information to have and a good strategy to pursue. But how do we know that our defensive tools, the stack of network, cloud, e-mail, and endpoint security tools that we array to keep both our traditional and nontraditional IT devices safe, are working?

How do we know if an emerging threat is able to slip through our firewall, or run undetected on an endpoint, or make it through our e-mail gateway to target an unsuspecting phishing victim?

The same principle applies; we really need to test our defensive stacks, on a continuous basis, to make sure they’re optimised and tuned to catch the latest attacks that threat actors are deploying against us.

This lets us, finally, go on the offensive and think like an attacker – we can test and probe our networks and devices ourselves, discovering vulnerabilities and attack paths ourselves, rather than waiting for a bad guy to do it.

We can get ahead of hackers by discovering and closing gaps in detection and visibility before they can be used against us.

Scott Register is VP Security Solutions at Keysight Technologies, which offers IOT Security Assessment, Threat Simulator, and Vision Series Network Packet Brokers to help companies stay one step ahead of security threats.

Softbank Robotics launches first rent-a-robot offering for cleaning services in Singapore
A connected world to revolutionise lifestyles, enterprises, cities
Global agency needed to investigate cyber crimes and take action
Meeting the healthcare sector’s unique challenges
NUS assistant professor finds winning startup formula with deep technology research
TAGGED:cybersecurityIoTKeysightphishingsponsored

Sign up for the TG newsletter

Never miss anything again. Get the latest news and analysis in your inbox.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Whatsapp Whatsapp LinkedIn Copy Link Print
Previous Article Singapore 5G prices under pressure as more virtual operators join the fray
Next Article A new look for the new Year of the Rabbit
Leave a Comment

Leave a ReplyCancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Stay Connected

FacebookLike
XFollow

Latest News

Scammers are so successful they even accidentally scam themselves now
Cybersecurity Internet
June 10, 2025
Doom: The Dark Ages review: Future fantastic demon slaying
Gaming
June 10, 2025
Plaud NotePin review: Note-taking made easy with AI
Internet Mobile
June 9, 2025
Can smart grocery carts, biometric payments boost retailers like FairPrice?
Enterprise Internet
June 6, 2025

Techgoondu.com is published by Goondu Media Pte Ltd, a company registered and based in Singapore.

.

Started in June 2008 by technology journalists and ex-journalists in Singapore who share a common love for all things geeky and digital, the site now includes segments on personal computing, enterprise IT and Internet culture.

banner banner
Everyday DIY
PC needs fixing? Get your hands on with the latest tech tips
READ ON
banner banner
Leaders Q&A
What tomorrow looks like to those at the leading edge today
FIND OUT
banner banner
Advertise with us
Discover unique access and impact with TG custom content
SHOW ME

 

 

POWERED BY READYSPACE
The Techgoondu website is powered by and managed by Readyspace Web Hosting.

TechgoonduTechgoondu
© 2024 Goondu Media Pte Ltd. All Rights Reserved | Privacy | Terms of Use | Advertise | About Us | Contact
Join Us!
Never miss anything again. Get the latest news and analysis in your inbox.

Zero spam, Unsubscribe at any time.
 

Loading Comments...
 

    Welcome Back!

    Sign in to your account

    Username or Email Address
    Password

    Lost your password?