Exploiting internet of things (IoT) technology without creating cybersecurity vulnerabilities is one of the defining challenges in today’s security landscape.
Axis communications has commissioned a white paper on the subject. Written by James Willison, Founder of Unified Security Ltd and Vice Chair of the ASIS European Convergence/ESRM Committee, and Sarb Sembhi, CTO and CISO at Virtually Informed, Converged Security Management: A single view on security risks examines the rise of the IoT, why third parties should adhere to ‘secure by design’ principles and why the necessary convergence of IT and security departments demands a holistic approach.
The IoT revolution has come about thanks to falling component prices, global mobile device adoption, improvements in telecoms infrastructure and the rise of application programming interfaces (APIs).
Unsecured and therefore vulnerable devices are now easily searchable through online vulnerability search engine Shodan, among many other means. A series of cyber-attacks targeting such devices as conduits to wider corporate networks has exposed the complacency of some manufacturers over cybersecurity.
The consequences of successful breaches – the loss of sensitive data and potentially multi-million pound fines levied for breaches of the forthcoming Global Data Protection Regulation (GDPR) – mean the issue is finally getting the attention it warrants.
The arguably lower standards of security for consumer devices is a problem, as is the use of third-party suppliers who may not take security as seriously as they should.
According to the Department of Homeland Security, “this inter-connectedness of devices introduces cyber-physical technologies that connect cyber systems to physical systems, thereby removing the barrier between the cyber and physical worlds […] but the greater connectivity also expands the potential attack surface for malicious actors.”
James Willison BA MA MSyI
Sarb Sembhi CISM
If you are involved in the operation or maintenance of physical security systems, this resource from Vanderbilt will help you choose the right equipment for staying diligent. It provides a five step process for strengthening the resilience of those systems against cyber-attack, as well as explaining what cyber-attacks mean in an interconnected world.
Discover the five step process now by clicking here.