Take these 6 security measures to protect your IoT devices from hackers

Advertisement

This story was originally sent to thousands of professionals just like you in this morning's IoT INSIDER daily newsletter. Don't be left in the dark while your competition gets ahead each morning. Learn more about our 7-day FREE trial now »

Advertisement

Internet Of Things Cybersecurity Market Global Investment Per Year 1
BI Intelligence estimates that by 2020 there will be more than 23 billion IoT devices connected to the internet. One of the biggest challenges in connecting so many devices will be in securing them to prevent hackers from controlling them or using them to infiltrate networks and databases. Many low-power IoT devices don't have the computing power to run antivirus software like a computer.

A recent blog post on EETimes discussed six measures that can be used to protect IoT devices from hackers:

Complimentary Tech Event
Transform talent with learning that works
Capability development is critical for businesses who want to push the envelope of innovation.Discover how business leaders are strategizing around building talent capabilities and empowering employee transformation.Know More
  1. Use a Trusted Platform Module (TPM) for authentication. A TPM is a dedicated microprocessor that integrates cryptographic keys into devices to uniquely identify and authenticate them. Each device then has its own identifier that is encrypted by the keys. This will prevent hackers from hacking and impersonating a device to gain access to home, enterprise, or government networks.
  2. Use the Trusted Network Connect (TNC) standards to check for malicious software or firmware. The TNC standards offer a way to check devices for malicious software or firmware whenever they try to access networks or other devices. This would help prevent hackers from using hacked devices to upload spyware or other malicious software to networks or other devices.
  3. Isolate and remediate infected devices with security software and protocols. If a device is infected with malware or other malicious programs, it needs to be quarantined. The IF-PEP protocol can isolate an infected machine from other devices and networks. There are numerous solutions from security software vendors for clearing the device of the infection once its isolated.
  4. Layered security can limit the damage a hacker can do once device is hacked. A Mandatory Access Control system limits access to certain functions or files on a device for a given user. This acts as a choke point that can prevent hackers from gaining sensitive information through the hacked device.
  5. Data encryption is a must. This should go without saying, but data needs to be encrypted when stored on a device or in transit. The post recommended using a read-only mechanism to obstruct hackers' efforts to tamper with data on a device.
  6. Secure legacy systems through industrial control systems. To reach their full potential, IoT devices and systems have to be integrated with legacy machines or appliances that were never built to be connected or secured against hacking. Industrial Control Systems can segment that legacy hardware from other systems and secure communications between them with encryption. This, for instance, could prevent a hacker who has infiltrated the network of a connected factory from then taking control of the machinery on the assembly line.

Finding this article interesting? Thousands of professionals just like you had it in their inbox first. Stay ahead of the curve and gain a comprehensive understanding of the latest news & trends, start your day with the IoT INSIDER. Get 7-days FREE »

BI Intelligence estimates that spending on security for IoT devices and systems will increase five-fold from 2015 to 2019.

Advertisement

Here are other stories you need to know from today's IoT INSIDER:

  • GOOGLE MIGHT TRY TO DISRUPT APP ECOSYSTEM WITH APP STREAMING:
  • CALIFORNIA DMV CLEARS SELF-DRIVING CARS FROM FAULT IN ACCIDENTS
  • US CHIPMAKERS FACING UNCERTAINTY DUE TO TRADE BILL
  • APPLE, ADOBE, DROPBOX RANK HIGHEST IN DATA PRIVACY PRACTICES

Don't miss another day of breaking developments! Stay ahead of the curve and gain insight into the latest news & trends. Join thousands of other professionals who start the day with IoT INSIDER. Try it FREE for 7 days now »