• About Us
  • Advertising
  • Digital Magazine
  • Supplements
  • Media Pack
  • Privacy Policy
  • Contact us
CXO Insight Middle East
  • News
  • Opinion
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
    • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CXO50 Oman
    • CXO50
    • ICT Awards
      • Dubai 2025
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • Channel Awards 2024
    • All events
  • GITEX
  • Digital Magazine
No Result
View All Result
CXO Insight Middle East
  • News
  • Opinion
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
    • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CXO50 Oman
    • CXO50
    • ICT Awards
      • Dubai 2025
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • Channel Awards 2024
    • All events
  • GITEX
  • Digital Magazine
No Result
View All Result
CXO Insight Middle East
No Result
View All Result

Why IoT requires a strong security posture

by CXO Staff
January 19, 2020
in Opinions
Why IoT requires a strong security posture

While there are around 7.5 billion humans on the planet, the number of connected, Internet-enabled ‘things’ is set to reach 75 billion by 2025. Known in the industry as Internet of Things (IoT) devices, this array of gadgets, monitors, sensors and controllers is finding its way into every aspect of our existence.

 An IoT device is anything that can be connected to the Internet, communicate with other objects on the net and be controlled remotely. What has changed rapidly in recent years, is the variety of devices that can match the above criteria and the dangers that the owners of these devices can face.

In an industrial and urban setting, IoT devices collect lots of data. While some of it may not have value, much of it will relate to social performance and health & safety issues. This information can help save lives, improve the performance and safety of industrial machinery and help with crowd and traffic control; however, it can also damage the reputation or even impact your health if it ends up in the wrong hands.

Hacked IoT devices can be used for DDoS attacks, channelling the combined power of lots of, for instance, Wi-Fi routers to flood and bring down a server. That was exactly what the infamous Mirai botnet did, when it took down dozens of the world’s largest web services nearly a year ago. Botnets can not only make use of Internet-connected smart devices, but can also spy on a smart webcam owner once they are hacked.

The European Telecommunications Standards Institute (ETSI) has recently attempted to set a standard for consumer IoT security. Its 13 provisions attempt to set guidelines on-device security, storage and transmission of personal data, OS updates, installation and documentation. Other regions are also attempting to set regulations in order to capitalize on the power of IoT devices safely. Consumers also play an important role here and the ones who really do want to embrace the Internet of Things are advised to proceed with caution and do what they can to keep their devices secure.

To secure your interaction with IoT devices, Kaspersky strongly recommends that users follow some common best practices:

  1. Change the default password on your IoT device: such connected devices are usually sold with basic and generic user names and passwords.
  2. Always update your connected device’s OS when new updates are available: companies usually introduce security patches and bug fixes with every update.
  3. Unplug abandoned devices, it is also advised to stop using a device if it shows any odd behaviour such as rebooting or turning on by itself.
  4. Be sure to find out what your IoT device maker’s data collection policies are. If they don’t seem to have a policy, steer clear. If they do have one, try to opt-out of any aspect of it you may be uncomfortable with.
  5. Most smart devices manufactured today have a feature called Universal Plug and Play (UpnP), which allows devices to see each other on the network. Once these devices are connected, they can continue to communicate easily with each other. That means, of course, that one hacked device can become the gateway to all the other devices on the network. Unless you have a good reason to keep certain devices connected, disable this feature on everything on your network.
  6. Consider enabling two-factor authentication on any software that manages IoT devices. This will make it more difficult for rogue actors to access and hijack the devices.
  7. You should be wary of IoT devices and public Wi-Fi networks, especially if you are a user of wearables. If you’re in a public space and your devices are set to automatically connect to Wi-Fi, you may be exposing your data to everyone else on that network. So, avoid networks that don’t ask for a password and set your devices so they don’t try to connect to public Wi-Fi by default.
  8. If you have sufficient tech expertise or have access to it, create a separate Wi-Fi network for guests and other third parties. That way, the number of people with potential access to your IoT devices is restricted.

As with every other connected piece of technology, IoT devices can never be 100% secure. By taking a few practical steps, however, you can greatly reduce your chances of being the next victim of an IoT device hack.

Tags: featured2Kaspersky
ShareTweet

Related Posts

Empowering the UAE’s digital future through data sovereignty
Opinions

Empowering the UAE’s digital future through data sovereignty

As the UAE continues to lead the charge in technological innovation, the importance of data sovereignty has never been more...

May 26, 2025
AI agents are set to become an indispensable part of the GCC security apparatus
Opinions

AI agents are set to become an indispensable part of the GCC security apparatus

Middle Eastern countries continue to bet big on AI—and for good reason. National strategies like the UAE Artificial Intelligence Strategy...

May 23, 2025

Discussion about this post

Latest Issue

CVC Joins CD&R as an Investment Partner in Epicor

VAST Data and Cisco expand partnership

June 4, 2025
JAGGAER appoints first Chief Digital & AI Officer

JAGGAER appoints first Chief Digital & AI Officer

June 4, 2025
training skills ups killing

Huawei partners with Nafis to launch Emirati Talent Development Programme

June 4, 2025

The most trusted source of strategic intelligence for IT decision makers in the Middle East.

About

  • About Us
  • Advertising
  • Digital Magazine
  • Supplements
  • Media Pack
  • Contact Us

Policies

  • Privacy Policy

© 2024 – CXO Insight Middle East. All Rights Reserved.

Facebook-f X-twitter Linkedin
Separated they live in Bookmarksgrove right at the coast of the Semantics, a large language ocean. A small river named Duden.

About

  • About Us
  • Site Map
  • Contact Us
  • Career

Policies

  • Help Center
  • Privacy Policy
  • Cookie Setting
  • Term Of Use

Join Our Newsletter

© 2024 – CXO Insight Middle East. All Rights Reserved.

Facebook-f Twitter Youtube Instagram

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Join our mailing list
Sign up here to get the latest news, updates and special offers delivered directly to your inbox.
No Result
View All Result
  • News
  • Opinions
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
  • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CX50 Oman
    • CXO50
    • ICT Awards
      • Dubai
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect
    • Channel Awards 2023
    • All events
  • Videos
  • GITEX GLOBAL
  • Digital Magazine

© 2024 - CXO Insight Middle East. All Rights Reserved.