Intelligent CISO Issue 65 | Page 30

In our experience , the majority of security attacks stem from simple vulnerabilities .
Now is the time for decisive action to safeguard IoT ecosystems against a growing list of threats .
Enterprises must adopt a security framework that covers technology , people and processes .
editor ’ s question

?

ith IoT spending

W projected to skyrocket by 2027 , organisations must brace for the impact of this and incoming security regulation affecting connected devices . Even now , businesses are leaving themselves vulnerable to potential threats due to oversights such as weak passwords , inadequate training or a lack of security awareness or understanding at the board level .

According to a report by SonicWall , there were 57 million IoT malware attacks in the first half of 2022 , an increase of 77 %. Large-scale deployments are expanding the attack surface and there is a danger that the speed of market growth will outpace the industry ’ s ability to keep the technology secure . Now is the time for decisive action to safeguard IoT ecosystems against a growing list of threats .
The threat of cyberattacks can ’ t be ignored because malware or ransomware attacks , data breaches and any other type of cyberattack can cause damage on many levels . There is the cost of stopping the attack , of putting the issue right and the losses from recovery and down

In our experience , the majority of security attacks stem from simple vulnerabilities .

Now is the time for decisive action to safeguard IoT ecosystems against a growing list of threats .

time . There may be fines if there has been a compliance failing , then there is the often-immeasurable impact of reputational and brand damage .
In our experience , the majority of security attacks stem from simple vulnerabilities , such as failing to update default security settings or limiting access to necessary network services . Businesses need to be securing devices by design from the outset . With
IAIN DAVIDSON , SENIOR PRODUCT MANAGER , WIRELESS LOGIC security legislation coming into effect in 2024 , providers need to stay one step ahead and ensure they are anticipating these changes and proactively securing their customers ’ data . Moving forward , businesses need to adopt a secureby-design methodology , a holistic approach to solution design anticipates its future ability to defend against or detect and react to incidents over the life of devices .
There must also be a 360-degree approach to cybersecurity in terms of procurement , deployment and the management of devices and processes . Enterprises must adopt a security framework that covers technology , people and processes ; this needs to be rehearsed regularly to arrive at the optimal way to handle potential attacks .
There are tools that simulate security attacks that businesses can use to test how they will respond in the event of an actual incident . Additionally , digital twins could also be applied to model security threats by acting as virtual representations of devices or processes . By running simulations , companies can also rehearse scenarios such as firmware updates over-the-air . u

Enterprises must adopt a security framework that covers technology , people and processes .

30 www . intelligentciso . com