• About Us
  • Advertising
  • Digital Magazine
  • Supplements
  • Media Pack
  • Privacy Policy
  • Contact us
CXO Insight Middle East
  • News
  • Opinion
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
    • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Awards
      • 2025
      • 2024
      • 2023
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CXO50 Oman
    • CXO50
    • ICT Awards
      • Dubai 2025
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • All events
  • Digital Magazine
  • GITEX GLOBAL
No Result
View All Result
CXO Insight Middle East
  • News
  • Opinion
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
    • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Awards
      • 2025
      • 2024
      • 2023
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CXO50 Oman
    • CXO50
    • ICT Awards
      • Dubai 2025
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • All events
  • Digital Magazine
  • GITEX GLOBAL
No Result
View All Result
CXO Insight Middle East
No Result
View All Result

Why IoT requires a strong security posture

by CXO Staff
January 19, 2020
in Opinions
Why IoT requires a strong security posture

While there are around 7.5 billion humans on the planet, the number of connected, Internet-enabled ‘things’ is set to reach 75 billion by 2025. Known in the industry as Internet of Things (IoT) devices, this array of gadgets, monitors, sensors and controllers is finding its way into every aspect of our existence.

 An IoT device is anything that can be connected to the Internet, communicate with other objects on the net and be controlled remotely. What has changed rapidly in recent years, is the variety of devices that can match the above criteria and the dangers that the owners of these devices can face.

In an industrial and urban setting, IoT devices collect lots of data. While some of it may not have value, much of it will relate to social performance and health & safety issues. This information can help save lives, improve the performance and safety of industrial machinery and help with crowd and traffic control; however, it can also damage the reputation or even impact your health if it ends up in the wrong hands.

Hacked IoT devices can be used for DDoS attacks, channelling the combined power of lots of, for instance, Wi-Fi routers to flood and bring down a server. That was exactly what the infamous Mirai botnet did, when it took down dozens of the world’s largest web services nearly a year ago. Botnets can not only make use of Internet-connected smart devices, but can also spy on a smart webcam owner once they are hacked.

The European Telecommunications Standards Institute (ETSI) has recently attempted to set a standard for consumer IoT security. Its 13 provisions attempt to set guidelines on-device security, storage and transmission of personal data, OS updates, installation and documentation. Other regions are also attempting to set regulations in order to capitalize on the power of IoT devices safely. Consumers also play an important role here and the ones who really do want to embrace the Internet of Things are advised to proceed with caution and do what they can to keep their devices secure.

To secure your interaction with IoT devices, Kaspersky strongly recommends that users follow some common best practices:

  1. Change the default password on your IoT device: such connected devices are usually sold with basic and generic user names and passwords.
  2. Always update your connected device’s OS when new updates are available: companies usually introduce security patches and bug fixes with every update.
  3. Unplug abandoned devices, it is also advised to stop using a device if it shows any odd behaviour such as rebooting or turning on by itself.
  4. Be sure to find out what your IoT device maker’s data collection policies are. If they don’t seem to have a policy, steer clear. If they do have one, try to opt-out of any aspect of it you may be uncomfortable with.
  5. Most smart devices manufactured today have a feature called Universal Plug and Play (UpnP), which allows devices to see each other on the network. Once these devices are connected, they can continue to communicate easily with each other. That means, of course, that one hacked device can become the gateway to all the other devices on the network. Unless you have a good reason to keep certain devices connected, disable this feature on everything on your network.
  6. Consider enabling two-factor authentication on any software that manages IoT devices. This will make it more difficult for rogue actors to access and hijack the devices.
  7. You should be wary of IoT devices and public Wi-Fi networks, especially if you are a user of wearables. If you’re in a public space and your devices are set to automatically connect to Wi-Fi, you may be exposing your data to everyone else on that network. So, avoid networks that don’t ask for a password and set your devices so they don’t try to connect to public Wi-Fi by default.
  8. If you have sufficient tech expertise or have access to it, create a separate Wi-Fi network for guests and other third parties. That way, the number of people with potential access to your IoT devices is restricted.

As with every other connected piece of technology, IoT devices can never be 100% secure. By taking a few practical steps, however, you can greatly reduce your chances of being the next victim of an IoT device hack.

Tags: featured2Kaspersky
ShareTweet

Related Posts

Is your IT estate holding your organisation back from fully embracing AI?
Opinions

Is your IT estate holding your organisation back from fully embracing AI?

December 6, 2025

Thibault Dousson, Director, Lenovo Services and Solutions Group, META, explores why modernising the IT estate is crucial for unlocking AI...

Safeguard your systems: 10 security rules for AI Agent onboarding
Opinions

Safeguard your systems: 10 security rules for AI Agent onboarding

November 6, 2025

Organisations in the United Arab Emirates (UAE) have recognised that agentic AI is no passing fad. One estimate puts its...

Discussion about this post

Latest Issue

Is your IT estate holding your organisation back from fully embracing AI?

Is your IT estate holding your organisation back from fully embracing AI?

December 6, 2025
Covoro YouCloud unveils Agentic AI UAE E-Invoicing solution at Tax Technology Summit

Covoro YouCloud unveils Agentic AI UAE E-Invoicing solution at Tax Technology Summit

December 5, 2025
Human error fuels breaches as only half of professionals receive cybersecurity training, Kaspersky finds

Human error fuels breaches as only half of professionals receive cybersecurity training, Kaspersky finds

December 5, 2025

The most trusted source of strategic intelligence for IT decision makers in the Middle East.

About

  • About Us
  • Advertising
  • Digital Magazine
  • Supplements
  • Media Pack
  • Contact Us

Policies

  • Privacy Policy
© 2025 – CXO Insight Middle East. All Rights Reserved.
Facebook-f X-twitter Linkedin
Separated they live in Bookmarksgrove right at the coast of the Semantics, a large language ocean. A small river named Duden.

About

  • About Us
  • Site Map
  • Contact Us
  • Career

Policies

  • Help Center
  • Privacy Policy
  • Cookie Setting
  • Term Of Use

Join Our Newsletter

© 2024 – CXO Insight Middle East. All Rights Reserved.

Facebook-f Twitter Youtube Instagram

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Join our mailing list
Sign up here to get the latest news, updates and special offers delivered directly to your inbox.
No Result
View All Result
  • News
  • Opinions
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
  • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Awards
      • 2025
      • 2024
      • 2023
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CX50 Oman
    • CXO50
    • ICT Awards
      • Dubai
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • All events
  • Videos
  • GITEX GLOBAL
  • Digital Magazine

© 2025 - CXO Insight Middle East. All Rights Reserved.