In 2021, there were more than 10 billion active IoT devices. These software connections create an unprecedented attack surface. For organizations responsible for critical infrastructure, national security, and defense, these threats can mean the difference between life and death.
Dellfer for Defense IoT
Dellfer takes a unique approach to protecting IoT devices used by DoD. Conceptually, it is simple. Dellfer essentially takes a fingerprint of the software that manufacturers use to run an IoT device, then sets up detection mechanisms that trigger defenses if any changes appear. For instance, if malware is injected into the software, Dellfer detects it and quarantines it. Or, if the software is altered to behave differently, Dellfer identifies the source of the issue and neutralizes it.
Risks for Connected Devices
According to the U.S. Department of Homeland Security:
“Network-connected devices, systems, and services are also increasingly integrated with and relied upon by our Nation’s critical infrastructure, leading to a national dependency. The characteristics of the IoT ecosystem also result in multiple opportunities for malicious actors to manipulate the flow of information to and from network-connected devices.”
IoT Expands Attack Surface
According to Cybersecurity & Infrastructure Security Agency (CISA):
“The adoption and integration of Internet of Things (IoT) and Industrial Internet of Things (IIoT) devices has led to an increasingly interconnected mesh of cyber-physical systems (CPS), which expands the attack surface and blurs the once clear functions of cybersecurity and physical security. A successful cyber or physical attack on industrial control systems and networks can disrupt operations or even deny critical services to society.”
Measures of IoT Risk to Critical Operations
- The average cost of a security incident impacting industrial control systems (ICS) or other operational technology (OT) systems is roughly $3 million.
- 48% of manufacturing industries have suffered a cyberattack.
- IoT devices are typically attacked within five minutes of connecting to the internet.
- 71% of the OT cybersecurity threats go unattended for up to 3 months.