- ‹ previous
- 7 of 8
- next ›
Just as hackers will employ poorly secured home networks to get at high-value corporate resources, so too will they exploit vulnerable Internet of Things (IoT) and industrial Internet of Things (IIoT) hardware for the same purpose, according to Mike Riemer, chief security architect at Pulse Secure.
“A lack of segregation between company IoT/IIoT devices and the rest of the network will result in an increase in breaches,” he says, especially because the OT solutions those devices connect to are increasingly in the cloud. “We will see more hackers looking to infiltrate a host OT system on the web to gain access to various tenants. From there, these bad actors can go in and hit an IoT device on somebody’s network and drop some sort of bot or ransomware on it that then goes after the internal systems.”
Related News
Related Features
More Galleries like This
Ransomware is one of the biggest cyber threats affecting businesses today. How can you stay protected? Here are some tips.
Any way you measure it, ConnectWise buying Continuum and ITBOOST is a big deal. Here are first thoughts from the channel and other top vendors in the managed services market.
Find out about the latest cyberattacks (September 1 Edition) and who got hacked recently, from Android smartphones to CeX customers.
During its OpenText World conference this week, the parent company of Carbonite and Webroot said that an integrated mix of security and BDR is the only way to address this year’s expanded attack surface and treacherous threat landscape.