Common Challenges of Implementing a Single IoT Security Standard

ROLAND ATOUI | July 23, 2019

article image
IoT, as we know it today, allows us to make our lives easier—but it’s not 100 percent secure. It can be hard to understand why it’s so difficult to come up with a comprehensive cybersecurity standard for IoT. After all, if we can create this technology, we should be able to keep it secure.In theory, yes. However, in practice, there are many challenges that cybersecurity experts need to overcome first. Here are some common problems of implementing an IoT security standard that would make IoT devices more secure. Generic security encompasses all of the common cybersecurity mechanisms we use to keep our devices safe. However, these processes — authentication, access control and identification — face an increasing strain to accommodate all of the different use contexts and systems that IoT devices are developing. To make this process easier, we need more procedures and policies that would address the complexity of the current IoT situation.

Spotlight

Whitewall Energy

We help manufacturers to create smart and connected products, enabling an entirely new set of product functions and capabilities, which can be grouped into four areas: monitoring, control, optimization, and autonomy.

OTHER ARTICLES

OT/IoT Security Superheroes: Tackling the Remote Employee Challenge

Article | April 14, 2020

Organizations around the world are coping with a variety of challenges related to the COVID-19 outbreak. Many companies are struggling to convert their processes from ‘in-office’ to ‘remotely accessible’. And, they’re scrambling to find new ways to “remote” tasks – with “remote” now becoming a verb. For example, we’ve heard from many customers that adding or expanding remote employee access capabilities is a hot topic. One such customer told us that they went from 9% of their workforce working remotely, to 52%. Wow! That’s not only a substantial change to operations and processes – it also directly impacts the company’s security posture. The challenge facing OT security practitioners is daunting. We absolutely must secure the people and systems responsible for saving mankind from an alien super-virus pandemic. But, while the bad guys are lobbing attacks from afar, the good guys are acting behind the scenes like NPCs (non-player characters). They’re bypassing the security systems we developed through years of hard work, like using Gmail or Zoom, or turning off anti-virus, in the name of getting things done.

Read More

5G network – the key to the Industrial Internet of Things

Article | May 13, 2020

The Industrial Internet of Things changes our view on the classic concept of production today. The largest manufacturing companies are eager to reach for technological solutions that streamline and increase the efficiency of production processes. With the development of subsequent technologies, interest in the concept of industry 4.0 increases, and thus, the number of connected devices. To meet the demand for infrastructure with adequate capacity and speed it was necessary to evolve towards the next generation of networks – 5G.

Read More

What Is IoT Forensics? Challenges Ahead and Best Tools to Use

Article | May 24, 2021

Internet of Things, generally known as IoT, is a network of objects or things. Embedded sensors help connect and exchange data with other objects via the internet. IoT is often related to the concept of smart homes, including devices like home security systems, cameras, lighting, refrigerators, etc. With all this data being transmitted over the internet, it is easy for the data to be modified, deleted, or stolen, which can lead to an invasion, theft, etc. IoT forensics plays a vital role in maintaining the integrity and security of the data being transmitted. Join us as we explore this fascinating web of devices and how you can get started in this vibrant field of forensics.

Read More

5 Ways to Secure Your IoT Devices—Before They Get Hacked

Article | March 13, 2020

Internet of Things (IoT) devices make our lives more efficient and our day-to-day more convenient. They allow us to monitor our homes from afar, control our lights, thermostats, and locks and beef up the security of our homes—among a host of other things. But because smart devices have become so integrated into our lives, they leave us vulnerable to cybercrime too. In general, IoT devices have little to no built-in security, making them top targets for hackers. And since most IoT devices are interconnected, it puts your whole suite of devices at risk if even one gets hacked. Just as you lock your front door before you go to bed, you’ll want to make sure your IoT devices are secure before you start using them.

Read More

Spotlight

Whitewall Energy

We help manufacturers to create smart and connected products, enabling an entirely new set of product functions and capabilities, which can be grouped into four areas: monitoring, control, optimization, and autonomy.

Events