Click me
Transcribed

IoT Devices are Hacking Your Data

•.. UN KE8 .. PW ... SECURITY BREACH A IOT DEVICES The New Attack Vector Putting YOUR COMPANY AT RISK Internet of Things (loT) devices may seem harmless, but can actually pose a serious threat to the privacy and security of your business data. THINK YOUR EXISTING SECURITY SOLUTIONS ARE SUFFICIENT TO HANDLE THE THREAT? THINK AGAIN. To protect against loT, you must first accept that you have an lot security problem. Security professionals typically go through the following FIVE STAGES, before fully accepting this reality. 1 DENIAL STAGE But in reality, more than 55% of security professionals Security teams assume that they have COMPLETE CONTROL over their environment and networks. CAN'T EVEN SEE IOT DEVICES on their networks. 2 CALL IN THE LAWYERS STAGE Create an ACCEPTABLE USE POLICY that controls what people can and can't do with devices on the network. A recent survey found that just 57% And 48% of companies with a BYOD of workers are aware of COMPANY (Bring Your Own Device) policy have SECURITY POLICIES. absolutely no way of enforcing it. Which ultimately leaves YOU AND YOUR BUSINESS VULNERABLE to many security threats. INITIAL ACCEPTANCE OF A NEW IOT THREAT VECTOR STAGE ACCORDING TO TECHNOLOGY RESEARCH FIRM GARTNER: 12 B 10 B 8 B 6 B 4 B 2 B 16 18 IOT DEVICE USAGE will By 2020, over 25% of CYBER grow from 6.4 billion in 2016 ATTACKS will involve loT. to 11.4 billion in 2018. $1000 M Resulting in 1OT SECURITY $800 M SPENDING increasing from $600 M $348 million in 2016 to $400 M $840.5 million in 2020. $200 M 2016 2020 loT Threat Level: HIGH loT devices were leveraged to carry out the largest DDOS (Distributed Denial of Service) attack in history, which took down 20% of the internet. 4 FALSE CONFIDENCE IN STAGE EXISTING SOLUTIONS Existing NETWORK CONTROLS CAN'T SEE loT devices, bluetooth, or other critical loT device protocols. Therefore, IT Security teams must devise separate solutions for MONITORING WIRED AND WIRELESS networks and devices and begin altering security spending. loT will likely rise from 1% to 20% of 2020 annual SECURITY BUDGETS by 2020. O$0 5 IOT SECURITY STAGE ACCEPTANCE PLEDGE Tam responsible for security, but no longer have control over the networks, devices, and systems that I am used to. I must look past my own network and understand the devices and networks around me to secure my environment. loT devices and networks will be deployed by my company without my knowledge and I must not get mad, but rather incorporate them into my security strategy. Don't let loT devices jeopardize your security. Admit that you have a problem and begin taking the necessary steps to ensure the security of your most important data. PWNIE EXPRESS www.lnternetOfEvilThings.com http://www.informationweek.com/iot/iot-security-will-reach-o-million -by-2020-gartner-finds/d/d-id/1325248 SOURCES https://www.gartner.com/newsroom/id/3185623

IoT Devices are Hacking Your Data

shared by kensavage on Jan 11
378 views
4 shares
4 comments
Internet of Things (IoT) devices may seem harmless, but can actually pose a serious threat to the privacy and security of your business data from HACKERS. Think your existing security protocols are su...

Publisher


Category

Computers
Did you work on this visual? Claim credit!

Get a Quote

Embed Code

For hosted site:

Click the code to copy

For wordpress.com:

Click the code to copy
Customize size