TechRepublic: 3 inexpensive steps to secure IoT
IoT devices powered the attack against Dyn, causing major disruptions to certain web properties. Follow these three steps to secure your IoT devices.
By Keith Townsend
October 26, 2016
The recent DDoS attack against Dyn is an opportunity to highlight a primary reason for organizations to secure their systems against intruders. One of the common refrains I hear from IT managers is that their IT assets are of little value. Manufacturers, for example, don't believe their control systems are of any value to hackers, as they don't hold critical information and are easily reset to factory defaults if hacked. Hackers view such targets as precious resources.
The attack against Dyn had a sustained rate of 620Gbps. The result was the outage of several web services due to the inability to perform DNS resolution. According to security experts, the botnet was composed mainly of compromised IoT devices. Unsecured IoT devices are a treasure trove for botnet operators. It's the responsibility of IT managers to ensure these devices remain protected against botnet enlistment. IT security vendors offer expensive protection products. Alternatively, here are three simple steps to protect your enterprise IoT against compromise, even if you have a limited budget.
Click the URL above to read the full article
Votes:34