Account
Please wait, authorizing ...

Don't have an account? Register here today.

×

5 Tips for a More Secure IoT

Latin America. Current technology for the Internet of Things (IoT) has some limitations: battery life, bandwidth, transmission range, interoperability, among others. But don't be fooled, the available technology is enough to generate big changes in production processes, products, services and customer experiences.

A frequent topic in discussions about the Internet of Things is cybersecurity. It is not a minor problem, but perhaps it deserves an adjustment in its approach: cybersecurity should not be an obstacle to the IoT, but an enabler, you can promote it with the use of numerous tools, best practices and experiences drawn from the IT world.

Here's a 5-step guide to achieving these goals, ensuring that innovation in business and cybersecurity is aligned:

1) Security Awareness as a Principle: Whenever we incorporate new technologies into our lives and in business, we have the opportunity to start from scratch and design and implement architectures that incorporate the issue of security not only as a requirement, but as a principle for all decisions. Not only will it make security more effective and economical, it also supports riskier technical and business decisions, increasing the chances. This awareness should permeate the entire organization.

- Publicidad -

2) Identification of Security Requirements: Adoption involves considerations in the design of the technical architecture and its management model. At the stage when business requirements are identified, security requirements should also be included. As for the technical architecture, it is necessary to include incident prevention and containment mechanisms so that from the beginning it is reliable. For that, it is necessary to evaluate the capabilities and functionalities of the different elements: their sensors, their gateways, their vulnerabilities; what is the nature of the data they will transit, with which applications they will interact and where they are located – corporate data centers, mobile devices, cloud systems; and for whom they are intended, whether employees, third parties, customers or partners. Risk profiles must be identified as well as actions (mitigate, transfer, avoid, accept).

3) Containment mechanisms: Containment is commonly associated with incident response and isolating its effects. But doesn't it seem more effective to take it to the solution, design and deployment phase? Micro-segmentation technology can previously prevent the effect of unforeseen futures with different risk profiles. If you design and deploy the IoT architecture with containment as a principle, you will be one step ahead of cyber criminals in the event of successful access to your infrastructure. It is about reducing the Attack Surface, taking advantage of the flexibility and scalability that only advanced techniques provide. In addition, if network micro-segmentation is done by software, dynamic perimeter readjustment techniques can increase the resiliency and security of the architecture.

4) Operation: Incident Detection deserves attention. The volume and heterogeneity of connected devices as well as data should produce millions of alerts per day. Ensuring that relevant alerts are noticed, and only these, is like finding a needle in a haystack. Therefore, event correlation tools and SIEM (Security Incident & Event Management) platforms will be crucial to address this challenge.

5) Incident Response: Detection is necessary. This phase should provide qualified processes, tools, and professionals to effectively identify causes, investigate circumstances, and act on correction. 

As the line between the physical and digital worlds becomes dimmer, businesses become more susceptible to rapid change. It is important to review business strategies, weighing the opportunities and risks that the Internet of Things brings us. Among the risks, those caused by cybercrime can be analyzed under existing security practices, they are detected from the progress observed in recent years. The important thing is not to be scared. Fear of risks cannot paralyze the business. The biggest risk is not adapting.

Text written by Leonardo Carissimi, director of security solutions at Unisys for Latin America.

Richard Santa, RAVT
Author: Richard Santa, RAVT
Editor
Periodista de la Universidad de Antioquia (2010), con experiencia en temas sobre tecnología y economía. Editor de las revistas TVyVideo+Radio y AVI Latinoamérica. Coordinador académico de TecnoTelevisión&Radio.

No thoughts on “5 Tips for a More Secure IoT”

• If you're already registered, please log in first. Your email will not be published.

Leave your comment

In reply to Some User
Suscribase Gratis
SUBSCRIBE TO OUR ENGLISH NEWSLETTER
DO YOU NEED A SERVICE OR PRODUCT QUOTE?
LATEST INTERVIEWS

KNX DAYS VIRTUAL MÉXICO 2024

Webinar: Soluciones de proyección profesionales Epson

Epson presenta las innovaciones en su línea de productos, con los principales diferenciales y beneficios para instalaciones profesionales en educación, corporativo y grandes eventos. Por: Gabriel Goncalves, Gerente de Producto Regional Epson America Inc. https://www.avilatinoamerica.com/20...

KNX DAYS VIRTUAL ARGENTINA 2023

KNX DAYS MEXICO 2023 - Sesión 5: PANEL - Avances generales y proyectos de KNX en el país

KNX DAYS MEXICO 2023 - Sesión 4: Bienvenido al futuro de casas/edificios inteligentes con KNX IoTech

Ing. Edgar Iván Cienfuegos, Automatización de edificios - ESTÉVEZ https://www.knxlatinamerica.org/mex...
Load more...
SITE SPONSORS










LATEST NEWSLETTER
Ultimo Info-Boletin