• About Us
  • Advertising
  • Digital Magazine
  • Supplements
  • Media Pack
  • Privacy Policy
  • Contact us
CXO Insight Middle East
  • News
  • Opinion
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
    • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CXO50 Oman
    • CXO50
    • ICT Awards
      • Dubai 2025
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • Channel Awards 2024
    • All events
  • GITEX
  • Digital Magazine
No Result
View All Result
CXO Insight Middle East
  • News
  • Opinion
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
    • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CXO50 Oman
    • CXO50
    • ICT Awards
      • Dubai 2025
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • Channel Awards 2024
    • All events
  • GITEX
  • Digital Magazine
No Result
View All Result
CXO Insight Middle East
No Result
View All Result

Why we need a different approach to IoT security

by CXO Staff
April 9, 2020
in News
Why we need a different approach to IoT security

How can IoT organisations and their partners ensure device-level security is optimised?

There are two important ways companies can optimise their device-level security – monitor the devices and protect the network. When dealing with devices, organisations must be diligent. Keep an eye out for vulnerabilities to apply the latest patches as early as possible. The best way to protect yourself from exploits is to reduce the time between the exploits being ‘discovered’ and you being patched against them.

When it comes to the network, malware looks for a beachhead and then works to spread internally. To prevent this, IT teams must make sure each and every IoT device only has permissions to communicate with the devices it needs to. Segment your network through software-driven policies and tighten those policies as much as you can.

What do you see as the key threats?

A key threat is the IoT market itself. Small IoT devices are relatively cheap to develop, which has created a burgeoning ecosystem of start-ups developing ‘things’ on a daily basis. Even though we have been talking about IoT for years, this is still a relatively new market that has yet to shake out into the main players. Many of the manufacturers we see in the market today will either have moved on to newer ‘things’ or disappeared from the market entirely. The real risk is that these devices will remain in use -sometimes because we forgot they were there – vulnerable to exploits and un-patchable because there is nobody developing the patches.

Another potential issue is in company behaviour. IoT devices often fall under the purview of OT (Operational Technology). There is a tendency in OT of ‘if it isn’t broke then don’t fix it’ and the 24/7 world of OT means there is never an opportune moment for downtime for updates. This extends that time between the vulnerability being discovered and being patched against it.

Finally, most organisations do not know 100% what is connected to their networks. BYOD has a part to play in this, but the low cost and ease of implementing IoT devices have led to individual LOBs (Line of Business) going it alone, so IT is never in the picture. In addition, the historical complexity involved in micro-segmenting networks means there are not enough barriers to prevent exploits from spreading internally. This is a toxic combination of not knowing what’s on your network and then not being able to stop an exploit spreading.

What are the challenges and realities of this – how can a balance between cost, complexity and security be achieved?

The challenge for a lot of companies is that they are not starting from the best place. Many have hard segmented, single vendor, configuration driven networks built the same way they have been for 20 years. The prospect of a costly forklift upgrade to move into this new world is financially unappealing.

It requires a different mindset to embrace these changes. That said there are some practical steps in order to protect your business. Firstly, know what’s on your network – If you know what’s out there you can make an informed decision over what is allowed and start to restrict access. You also need to embrace open standards. Part of the reason many organisations have not made this move before is because they were tied in proprietary standards that required everything to be upgraded.

Finally, companies must create a collaborative partnership between IT and the LOBs. Avoid LOBs ‘rolling their own’ by understanding their different needs and applying security policies and tools to all needs.

Tags: featured3HPE ArubaiotmalwareSecurity
ShareTweet

Related Posts

HCLSoftware targets Middle East growth with XDO Framework launch in Dubai
Future

HCLSoftware targets Middle East growth with XDO Framework launch in Dubai

HCLSoftware, the enterprise software division of HCLTech, kicked off its high-octane Executive Summit at Madinat Jumeirah on June 3. The invitation-only...

June 18, 2025
EQT Completes Acquisition of WSO2
Business

Kiteworks acquire Zivver

Kiteworks, which empowers organisations to effectively manage risk in every send, share, receive, and use of private data, announced the...

June 18, 2025

Discussion about this post

Latest Issue

HCLSoftware targets Middle East growth with XDO Framework launch in Dubai

HCLSoftware targets Middle East growth with XDO Framework launch in Dubai

June 18, 2025
EQT Completes Acquisition of WSO2

Kiteworks acquire Zivver

June 18, 2025
By 2028, 80% of GenAI apps will run on existing data platforms, says Gartner

Why most businesses are not yet winning with AI, Kyndryl research

June 18, 2025

The most trusted source of strategic intelligence for IT decision makers in the Middle East.

About

  • About Us
  • Advertising
  • Digital Magazine
  • Supplements
  • Media Pack
  • Contact Us

Policies

  • Privacy Policy

© 2024 – CXO Insight Middle East. All Rights Reserved.

Facebook-f X-twitter Linkedin
Separated they live in Bookmarksgrove right at the coast of the Semantics, a large language ocean. A small river named Duden.

About

  • About Us
  • Site Map
  • Contact Us
  • Career

Policies

  • Help Center
  • Privacy Policy
  • Cookie Setting
  • Term Of Use

Join Our Newsletter

© 2024 – CXO Insight Middle East. All Rights Reserved.

Facebook-f Twitter Youtube Instagram

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Join our mailing list
Sign up here to get the latest news, updates and special offers delivered directly to your inbox.
No Result
View All Result
  • News
  • Opinions
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
  • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CX50 Oman
    • CXO50
    • ICT Awards
      • Dubai
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • Channel Awards 2023
    • All events
  • Videos
  • GITEX GLOBAL
  • Digital Magazine

© 2024 - CXO Insight Middle East. All Rights Reserved.