Tag Archives: IoT

New Security Standards Could Reduce the Number of Exposed Internet-Connected Devices

by Raimund Genes

When was the last time you checked how many of your organisations’ devices and systems were searchable from the public internet? Do you know for sure that they’re all properly patched and configured? New research from Trend Micro suggests the sheer volume of devices exposed to the internet is putting organisations at unnecessary risk of data theft, sabotage, fraud and disruption.

It’s time Europe’s policymakers woke up to the dangers and helped establish security standards for IoT and similar devices. Continue reading

It’s Time to Up Cyber Maturity Levels in 2017 – Starting with the Endpoint

by Bharat Mistry

As we close out another eventful year one thing is patently obvious: cyber threats have never represented a bigger risk to firms. Data and security breaches recently revealed at the likes of PayAsUGym, Ryanair, Lynda.com, KFC and more have all provide a timely festive reminder to CISOs of the value of multi-layered threat defence. More concerning still are new stats suggesting UK firms continue to operate with lower levels of security maturity than their US counterparts.

A good way to start the new year would surely be to consider how your organization can be smarter about security in 2017. And that means taking a look first at the endpoint.

Another year of breaches
Even before the catastrophic breaches at Yahoo, which may have affected over 1.5 billion accounts, were revealed, this was already shaping up to be another epic year for the black hats. Perhaps most worrying from the stream of breach incidents we’ve all read about in the news over the past 12 months is the fact that organisations are still making the same old mistakes.

Newly released data from UK-based insurer CFC Underwriting makes for particularly uncomfortable reading. It reveals that firm handled more than 400 claims on cyber breach policies this year – with the main categories being privacy breaches (31%), financial loss (22%) and ransomware (16%). Now, we don’t have mandatory breach reporting laws in the UK – not until the European GDPR comes into force in 2018, at least. So this is an interesting reminder that, while we might not always hear about them, security incidents are happening – and affecting UK firms every day.

More concerning still is that UK firms apparently represent 8% of the insurer’s policy count, but 17% of its claims count. Why does the UK have a disproportionately high volume of claims? CFC reckons because of the low cybersecurity maturity of these organisations.

Start with the endpoint
A comprehensive approach to cybersecurity of course requires multiple layers of protection including web and email gateways, networks and servers – not forgetting the vital “people” and “policy” elements. But many of the attacks which have led to damaging breaches over the past year started at the endpoint – the initial incursion point into the corporate network. We therefore need to start our efforts by better protecting this layer of infrastructure – but it’s not easy given the explosion in endpoints facilitated by cloud, mobile and IoT technologies.

Trend Micro’s answer is XGen: a cross-generational approach reliant on multiple layers of protection. None of these are a silver bullet on their own. But together they can form a formidable defence against the vast majority of known and unknown threats.

It should feature signature and non-signature based tools, including behavioural based filters, app control, exploit prevention and machine learning. The latter has been used for years by Trend Micro. But in this context we’ve made it even more effective at stopping threats by designing capabilities which extract and analyse a suspect file’s characteristics before and during its execution. This helps to reduce false positives and improve accuracy.

Endpoint compromise can play a vital role early on in the cyber kill chain. As we head into 2017, don’t underestimate the importance of gaining visibility and control at this layer. With huge regulatory pressure coming from Europe in 2018, no CISO can afford to ignore it.

 

 

On World IoT Day, Time to Address Enterprise Smart Technology Risks

by Bharat Mistry

There’s a global awareness raising initiative for just about every aspect of IT and cyber security today. World Backup Day, Safer Internet Day, Data Protection Day – they all share a common purpose; to engage, educate and motivate individuals and organisations around the world. This Saturday 9 April will see one such event – the fifth annual World Internet of Things (IoT) Day.

The IoT is already having a huge impact on our lives – both at home and, more importantly, at work. But in this race for the new we run a very real risk of adopting technology which has been designed with little regard for security or privacy. So let’s use the occasion of World IoT Day to think more carefully about how to secure smart technology in the enterprise. Continue reading

As CES 2016 Begins, More Reasons for a ‘Bring Your Own Wearables’ Policy

by Bharat Mistry

It might only be the first week in January but already the world’s biggest technology firms are lining up to show you what they’ve been up to over the past 12 months. Wednesday will see the official opening of CES 2016 – the world’s largest consumer electronics trade show. As always, Las Vegas will provide the backdrop as we get a tantalising glimpse into the future – and like last year, much of the focus is likely to centre on the Internet of Things.

But while CES shows us what’s coming down the road, CIOs would do well to remember that smart devices are already finding their way into the enterprise in ever greater numbers. And as they start to sync and share more data than ever before, IT leaders will need to start adapting BYOD plans accordingly.     Continue reading