• About
  • Subscribe
  • Contact
Wednesday, May 7, 2025
    Login
FutureIOT
  • Technology
    • Sensors and Instrumentation
    • Devices
    • Cloud and Platforms
    • Research and Development
    • Governance, Standards and Regulations
    • Application and Middleware
    • Security
    • Big Data and Analytics
    • AI and Machine Learning
  • Industry
    • Manufacturing
    • Transportation and Logistics
    • Retail and E-commerce
    • Banking and Financial Services
    • Government, Healthcare and Education
    • Industrial
  • Application
    • Smart Cities
    • Future Workplace
    • Commercial
    • Smart Home
    • Customer Engagement
  • Resources
  • Podchats
  • Videos
  • Events
No Result
View All Result
  • Technology
    • Sensors and Instrumentation
    • Devices
    • Cloud and Platforms
    • Research and Development
    • Governance, Standards and Regulations
    • Application and Middleware
    • Security
    • Big Data and Analytics
    • AI and Machine Learning
  • Industry
    • Manufacturing
    • Transportation and Logistics
    • Retail and E-commerce
    • Banking and Financial Services
    • Government, Healthcare and Education
    • Industrial
  • Application
    • Smart Cities
    • Future Workplace
    • Commercial
    • Smart Home
    • Customer Engagement
  • Resources
  • Podchats
  • Videos
  • Events
No Result
View All Result
FutureIOT
No Result
View All Result
Home Technology Security

PodChats for FutureIoT: Understanding the fundamentals of secure IoT

Allan Tan by Allan Tan
November 18, 2022
PodChats for FutureIoT: Understanding the fundamentals of secure IoT

PodChats for FutureIoT: Understanding the fundamentals of secure IoT

Gartner observed that in the past three years, nearly 20% of organisations have already observed cyberattacks on IoT devices in their network.

IoT Analytics forecasts that globally the number of connected IoT devices will grow at 9% annually, reaching 27 billion IoT connections by 2025. Riding on this growth of connected devices is an increased need for security.

ResearchandMarkets forecasts the global IoT security market to grow from US$3.86 billion in 2021 to US$5.09 billion in 2022. The firm attributes this growth due to the companies stabilizing their output after catering to the demand that grew exponentially during the COVID-19 pandemic in 2021.

While 64% of respondents to the Kaspersky study, Pushing the limits: How to address specific cybersecurity demands and protect IoT, use IoT solutions, as much as 43% do not protect them completely.

The National Institute of Standards and Technology (NIST) paper, Recommended Criteria for Cybersecurity Labelling for Consumer Internet of Things (IoT) Products, posits that to reduce IoT product vulnerabilities, it is important to understand already exploited vulnerabilities in IoT products and ensure that consumer IoT product labelling programmes consider these incidents in its criteria to help improve the cybersecurity of the IoT ecosystem.

Dr Dorit Dor, chief product officer with Check Point Software Technologies, explains that there are many levels to IoT leaving to misunderstanding and potential risks of exposure to threats from within and outside the organisation.

“Even the lowest cost IoT device could be a starting point for an attack. You have to understand the connectivity of the IoT device to the internal and outside world. The fact that it bridges the two things without having the right IoT controlling them is the biggest evidence of this,” she explained.

“People use IoT to do massive attacks (DDoS massive attacks) by taking over IoTs in many locations and doing denial of service or other destruction for the world. These are less focused attacks and more widespread attacks.”

Dorit Dor

More common than you think

Dr Dor cautions that attacks that stem from unprotected IoT are not always targeted at specific industries. She calls back understanding that cybercriminals are often looking for the least protected targets.

That is not to say that there are attacks that are specifically directed at certain industries or organisations.

“It is less of a sectorial issue. It's more of a general issue of IoT devices being spread around and kind of hindering the security architecture of the organisation. By creating all these hidden links, the IoT itself could be served as a jump point for the intended target,” she cautioned.

Common misconceptions and challenges

Dr Dor noted that one of the biggest misconceptions when it comes to IoT security is the perception among enterprises that they do not have any IoT devices in the workplace. And if they did, the other misconception is that these devices are not connected to the internal network (without their knowledge).

Another misconception, she added, is enterprises think they are protected when they are not.

“People don’t always have the right personnel to perform the security sections required,” she posited.

Advanced technologies to the rescue?

Asked whether any advanced technologies help solve some of the challenges she presented, Dr Dor is confident that tools are available to help in the process of understanding the challenges.

She cited the use of artificial intelligence (AI) as helping map the devices that are seen on the network of IoT devices and mapping their behaviour.

“But to do this, you need to have a lot of data on similar IoT devices that exist,” she cautioned.

“So as an organisation, you may not have enough data to secure your IoT devices. However, you probably have enough data on different uses and usages of this IoT device that could help you sanction or create sectioning policies for the IoT device.”

Dorit Dor

Bringing about greater security of IoT devices in the enterprise

Dr Dor suggests reducing the access atmosphere of the IoT device to the least limited or a zoning-based approach. The other step is to understand what the IoT does and see that it behaves like a legitimate IoT device.

She recommended organisations buy IoT devices that have some security and stability built in.

Click on the PodChat player and hear in greater detail Dr Dor’s observations and recommendations for securing IoT for the enterprise.
  1. What are the IoT cyber security threats faced by enterprises?
  2. How common are these threats?
  3. What are common misconceptions and challenges encountered today when enterprises try to secure IoT devices?
  4. Can advanced technology such as AI, machine learning and deep learning solve these problems?
  5. What are the roles of AI, machine learning and deep learning in IoT security?
  6. What are your recommendations to bring about greater security of IT devices in the enterprise?
Related:  A three-step guide to ransomware protection for IoT
Tags: Check Point Software TechnologiesIoT securityPodChats
Allan Tan

Allan Tan

Allan is Group Editor-in-Chief for CXOCIETY writing for FutureIoT, FutureCIO and FutureCFO. He supports content marketing engagements for CXOCIETY clients, as well as moderates senior-level discussions and speaks at events. Previous Roles He served as Group Editor-in-Chief for Questex Asia concurrent to the Regional Content and Strategy Director role. He was the Director of Technology Practice at Hill+Knowlton in Hong Kong and Director of Client Services at EBA Communications. He also served as Marketing Director for Asia at Hitachi Data Systems and served as Country Sales Manager for HDS’ Philippine. Other sales roles include Encore Computer and First International Computer. He was a Senior Industry Analyst at Dataquest (Gartner Group) covering IT Professional Services for Asia-Pacific. He moved to Hong Kong as a Network Specialist and later MIS Manager at Imagineering/Tech Pacific. He holds a Bachelor of Science in Electronics and Communications Engineering degree and is a certified PICK programmer.

No Result
View All Result

Recent Posts

  • Surge in ambient IoT to pave the way for sustainable tech
  • Imbibing AI skills into Singapore’s future workforce today
  • Asia Pacific's AI ambitions hinge on next-generation networks
  • Gartner urges supply chain leaders to adopt cost-to-serve model
  • Navigating cyber chaos while safeguarding Asia's supply chains

Categories

  • Agriculture
  • AI and Machine Learning
  • Application
  • Application and Middleware
  • Automotive
  • Banking and Financial Services
  • Big Data and Analytics
  • Blockchain
  • Case Studies
  • Change Healthcare
  • CHRO
  • Cloud and Platforms
  • Commercial
  • Construction
  • Consumer
  • Customer Engagement
  • Devices
  • ESG
  • Future Workplace
  • FutureCOO
  • Governance, Standards and Regulations
  • Government, Healthcare and Education
  • Hospitality and Tourism
  • Industrial
  • Industry
  • IT-OT integration
  • Manufacturing
  • Networking
  • Operations
  • Research and Development
  • Retail and E-commerce
  • Security
  • Sensors and Instrumentation
  • Smart Cities
  • smart contracts
  • Smart Home
  • Start-ups
  • Supply chain
  • Technology
  • Telecommunications
  • TIBCO
  • Transportation and Logistics
  • Videos
  • Whitepapers

About FutureIoT

Asia’s ONLY dedicated IoT publication

The race to harness the power of Internet of Things (IoT) is here. FutureIoT is dedicated to individuals, as well as public and private organizations looking to tap the potential of IoT to transform the way we live, work and do business. FutureIoT is the dedicated media that provides the single source of truth about IoT, the technology, its application and regulation, originating from Asia. << Read more >>

Quick Links

  • Subscribe
  • Contact
  • Privacy Policy
  • Cookie Policy
  • Terms of Use

Categories

Recent News

Photo by John Tekeridis: https://www.pexels.com/photo/round-grey-speaker-on-brown-board-1072851/

Surge in ambient IoT to pave the way for sustainable tech

May 7, 2025
Imbibing AI skills into Singapore’s future workforce today

Imbibing AI skills into Singapore’s future workforce today

May 6, 2025
  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Technology
    • Sensors and Instrumentation
    • Devices
    • Cloud and Platforms
    • Research and Development
    • Governance, Standards and Regulations
    • Application and Middleware
    • Security
    • Big Data and Analytics
    • AI and Machine Learning
  • Industry
    • Manufacturing
    • Transportation and Logistics
    • Retail and E-commerce
    • Banking and Financial Services
    • Government, Healthcare and Education
    • Industrial
  • Application
    • Smart Cities
    • Future Workplace
    • Commercial
    • Smart Home
    • Customer Engagement
  • Resources
  • Podchats
  • Videos
  • Events
Login

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Subscribe