Securing IoT devices to maximise their value

Issue 7 2022 IT infrastructure, Cyber Security

Amritesh Anand.

The Internet of Things (IoT) offers numerous opportunities for businesses to gain new insight, streamline processes and leverage additional sources of data. However, anything that is connected to the Internet is a potential security vulnerability, and IoT devices are increasingly targets through which cybercriminals infiltrate networks.

Any connected device must be adequately protected as part of an overall security strategy, and to help businesses leverage the value of IoT data for analytics. Beyond that, the right IT partner and effective KPIs and execution strategy can help businesses gain more control over critical data and these intricate assets.

A growing market

The South African IoT market is estimated to grow at a CAGR of 20,96% through 2025. While IoT has many applications, it is seeing significant growth in manufacturing, transportation, healthcare, retail, energy and utilities, and the residential market. Digital transformation in the manufacturing industry and the implementation of smart manufacturing is further fuelling the South African IoT market.

This growth is being driven by the rise of artificial intelligence and big data, as well as rapid increases in the use of smart devices across industries, including the home. Smart, connected IoT devices are being used in many areas, including asset tracking, connected vehicles, smart metering for power and utilities, IoT-based goods condition monitoring in transit, predictive maintenance and more. However, security issues remain a concern and a challenge for the implementation of IoT.

Risky business

As the use of IoT devices grows, so too do the risks associated with them, and as more devices are connected, the potential attack surface widens. IoT devices are prone to vulnerabilities and are often used in malicious exploits, and this risk needs to be mitigated. However, patching, upgrades and maintenance can be challenging if this is not automated, due to the sheer volume of connected devices that must be managed. The ever-present skills gap also comes into play as there is a shortage of resources with the skills required to secure and manage IoT devices.

IoT devices present an overly large attack surface and have inherent application vulnerabilities, but often organisations also have incorrect access control and insufficient physical security. Addressing these issues is essential in ensuring that the value of IoT can be maximised while the threats connected devices present are minimised.

Securing IoT

There are a number of best practices that can be put into place to secure IoT devices, including device discovery for complete visibility, network segmentation for stronger defence, secure password practices, automated patching and firmware updating, and active monitoring of all IoT devices at all times.

Poor IoT device management is an ongoing problem that requires a vulnerability management solution to deliver constant and periodic security checks on vulnerabilities, firmware updates, alerting and reporting. In addition, many IoT security solutions include hardware-based and virtual firewalls, device identification tools, and other tools designed to provide visibility and protection for unmanaged IoT devices, to curb the threat of malicious traffic and attempted breaches.

A managed IoT security solution is often an effective option to ensure that weak points in connected devices and the servers, APIs and cloud services that interact with them can be identified and addressed to mitigate risk and vulnerability.

Remote monitoring and managed services are key

Remote monitoring is an essential tool to monitor the health of IoT assets, generate automated alerts and notifications, track equipment, and monitor performance and usage. Proactive monitoring also enables predictive maintenance to ensure assets are always functioning optimally and never break down.

IoT security ensures the availability, integrity and confidentiality of your IoT solution. IoT security tools protect from threats and breaches, identify and monitor risks, and can help fix vulnerabilities. With the lack of currently available skills, a trusted IT partner offering a managed IoT security service is essential to securing the IoT, mitigating risk, effectively managing assets, and maximising the value of IoT for business benefit.

For more information contact In2IT Technologies, Amritesh Anand, +27 11 054 6900

Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Industrial control systems under attack
News Cyber Security
According to Kaspersky ICS CERT statistics, from January to September 2022, 38% of computers in the industrial control systems (ICS) environment in the META region were attacked using multiple means.

ALM a key element of data security
IT infrastructure
ALM is core to any data security framework in the digital age and it is an element that no business can afford to be careless with.

Integrate, integrate, integrate
IT infrastructure
Security and speed will always war for dominance in DevOps but it’s time to integrate the two as the landscape becomes increasingly fractious and complex.

Sasol ensures Zero Trust for SAP financials with bioLock
Technews Publishing Editor's Choice Cyber Security Security Services & Risk Management
Multi-factor authentication, including biometrics, for SAP Financials from realtime North America prevents financial compliance avoidance for Sasol.

The benefits of Managed File Transfer
IT infrastructure Products
Blue Turtle Technologies looks into how a Managed File Transfer platform benefits businesses, as opposed to the usual FTP or SFTP suspects.

Accelerating your Zero Trust journey in manufacturing
IT infrastructure Cyber Security Industrial (Industry)
Francois van Hirtum, CTO of Obscure Technologies, advises manufacturers on a strategic approach to safeguarding their businesses against cyber breaches.

Cyber resilience is more than cybersecurity
Technews Publishing Editor's Choice Cyber Security Integrated Solutions IT infrastructure
Hi-Tech Security Solutions held a round-table discussion focusing on cyber resilience and found that while the resilience discipline includes cybersecurity, it also goes much further.

Keeping devices in check
Cyber Security Asset Management, EAS, RFID IT infrastructure
Kaspersky patents new technology for analysing relationships between electronic devices to counter cyberattacks launched through connected IoT devices.

IQ WiFi 6 supporting users and security installers
IT infrastructure Products
The IQ WiFi 6 is a new purpose-built mesh router solution for homes and businesses with security, automation and Wi-Fi devices.

Considering cloud downtime insurance?
Arcserve Southern Africa Cyber Security IT infrastructure Security Services & Risk Management
Byron Horn-Botha, business unit head, Arcserve Southern Africa, reveals three vital steps that you must consider to ensure business continuity before you buy insurance.