Enterprise IoT and protecting against Bluetooth endpoint vulnerabilities: A guide

It is well established that IoT devices greatly increase the security challenges of defending corporate networks, and a recent PwC survey reported that 71% of manufacturers plan to deploy IoT devices, despite the associated risks. It seems like the IoT train has left the station and is rushing full steam ahead towards the horizon. In order to continue to travel safely, enterprises must understand the risks of deploying IoT devices and how to mitigate them. This assessment process should consider the devices that create the risk, an analysis of the type of attacks that they can be used for and the potential implications and regulatory risks. When it comes to leveraging vulnerabilities on these devices, one area that is frequently overlooked is Bluetooth. This low-powered wireless technology is on every endpoint, widely used in IoT devices is often active and usually discoverable by default.

Spotlight

As enterprises embrace the big return to the office, ensuring seamless and reliable connectivity has become crucial. Employees, accustomed to video-first communications, demand a LAN infrastructure that supports their needs without interruptions. Unfortunately, many LANs are struggling to keep up due to outdated equipment, softw

Spotlight

As enterprises embrace the big return to the office, ensuring seamless and reliable connectivity has become crucial. Employees, accustomed to video-first communications, demand a LAN infrastructure that supports their needs without interruptions. Unfortunately, many LANs are struggling to keep up due to outdated equipment, softw

Related News