IoT Cybersecurity – A Top Priority in 2023

IoT isn’t just a buzz tech term, it is increasingly a foundation for all operations. Essentially, it is the network that connected devices rely on. And, as we know, connected devices are used in almost every industry, sector and business at this point. So, as we look to 2023, it is likely that further adoption of IoT will only continue. Therefore, strengthening IoT cybersecurity should take a top spot on the priority list.

IoT Cybersecurity Threats

As TechRepublic points out, “In the first half of 2022, there were 2.8 billion worldwide malware attacks and 236.1 million ransomware attacks. By year end 2022, it is expected that six billion phishing attacks will have been launched.” Considering these troubling trends, it’s clear why cybersecurity is going to be a focus. Of course, one of the main threat areas that will require attention is IoT.

An example of the type of breaches that can unfold if IoT devices are not properly shielded is a warning recently released by Microsoft. The company released an alert noting that hackers have been exploiting a discontinued web server found in common IoT devices in order to gain access into the energy sector. More specifically, their target was the Boa web server, which is used in routers, security cameras and popular software development kits (SDKs) even though it was discontinued in 2005.

The risk faced by IoT also extends to the tech to branch out of it, such as IIoT. According to TechRepublic, the foremost IIoT security issues include data siphoning, device hijacking, distributed denial of service and data breaches via legacy systems.

Prioritizing IoT Cybersecurity

Considering the expanding threat landscape, Deloitte analysts listed tackling connected device visibility and security as one of their leading cybersecurity strategies for 2023.When speaking with VentureBeat, Wendy Frank, Deloitte’s US Cyber IoT leader, shared that:

“Leading organizations will focus in the year ahead on connected device cyber practices by establishing or updating related policies and procedures, updating inventories of their IoT-connected devices, monitoring and patching devices, honing both device procurement and disposal practices with security in mind, correlating IoT and IT networks, monitoring connected devices more closely to further secure those endpoints, manage vulnerabilities, and respond to incidents.”

Sources:

 

Share

Table of Contents

Subscribe to
The Dellfer Brief

The latest industry insights and company news delivered to your inbox.

See Our Blog Posts

IT Support by SADOSSecure, Fast Hosting for WordPress

Enter Your Information to Access This White Paper

Enter Your Information to Access This White Paper

Enter Your Information to Access This White Paper

Enter Your Information to Access This White Paper

Enter Your Information to Access This Datasheet

Enter Your Information to Access This Datasheet