The volume of IoT devices is booming, Juniper Research forecasts that there will be almost 38.5 billion devices connected to the internet by 2020. So what is IoT and why does it matter? Connected devices are critical to various industries including healthcare, manufacturing, agriculture, and energy.

IoT devices are very poor in regard to security. Specifically the lack of updates, encryption, and negligence creates vulnerability in a business network due to IoT devices.  “Unknown unknowns,” are devices that IT security teams aren’t even aware of that could potentially lead to network exposer.

So what steps can an IT department take to lessen IoT vulnerabilities?

You don’t have to connect everything

Odds are your workplace has multiple devices that are able to connect to the internet.  Refrigeraters, watercoolers, lighting, etc.  “Smart” appliances connect to the internet. While convient and modern, not everything should have internet access. In fact, a majority of these types of devices don’t have standard update protocols. Leaving most connectable appliances vulnerable to attack.

Developing a companywide standard for wearables and other IoT devices will help business network security. Employees with personal IoT devices should be wary about what they are connecting to and must adhere to set security standards. In an ideal scenario, employees wouldn’t connect personal devices to the business network, however this is sometimes impossible.

Separate networks are key

Most WiFi access points have guest networks. As a result, it is important to keep guest networks separate from your business network that which includes shared data files and workplace computers. Guest networks are a barrier to entry from unauthorized users and breaches from unmonitored IoT devices.

In an ideal environment, IT security teams would create an entire network for IoT devices alone. Above all, keeping IoT seperate prevents access to business data and workstations.

Monitor devices and assess your network

Workplaced must track everything that connects to the network and monitor traffic flow. Different levels of access allows for tracking devices entering the network. Depending on the device and employee, restrictions can be put in place for business security. For instance, an employee wearable would have little to no access to the business network.

All devices that enter the network must be monitored to ensure they are fully patched and up to date when updates are available. Any unknowns should alert IT team. IT technicians should actively look for unknown devices in their network. IoT devices are only increasing, it is crucial for businesses to secure networks from unmonitored devices and vulnerable IoT devices.

To learn more about creating a secure business network, contact CompuOne.

0 Comments

Leave a Reply