IT Brief Asia logo
Technology news for Asia's largest enterprises
Story image

How organisations can mitigate IoT and IIoT security risks

By Contributor
Wed 6 Jul 2022

Article by Wavelink* CEO Ilan Rubin

The digital industrial revolution in the wake of the COVID-19 pandemic has sparked intense growth for the Internet of Things (IoT) and Industrial Internet of Things (IIoT) markets. However, these game-changing technologies have security risks that must be addressed for organisations to reap the full benefits. As organisations increasingly rely on IoT and IIoT to manage critical business systems, finding the right security approach is essential.

IoT and IIoT come with inherent risks because they are often deployed faster than they can be secured. This puts organisations in danger of cyber threats such as device hijacking, data breaches or siphoning, device theft, spoofing, and denial of service attacks. These types of attacks have severe operational, financial, safety and reputational outcomes for organisations.

This is especially concerning because organisations trust technology to gather sensitive data, connect virtual and physical environments, manage production workflows and predictive maintenance, including safety aspects, and dynamically interact with each other. When trusting technology to this extent, it is critical to ensure organisations have the right policies to mitigate risks and reduce the impact of a cyber breach.

A key issue is that IoT and IIoT devices were not designed to be secure, with many having passwords hard-coded into their firmware, making it difficult for security to be patched or updated. Even if security is installed on a device, it can be circumvented in most cases by exploiting a wide range of known vulnerabilities. When IoT or IIoT devices are compromised, IT teams may find it challenging to detect an event before it impacts systems and data.

There are five ways to mitigate IoT and IIoT security risks. As part of this approach, it is important to consider the IoT/IIoT environment holistically and not as separate components or devices.

  1. Segment the production environment so that all IIoT and wireless devices sit outside of the supervisory control and data acquisition (SCADA) or industrial control system (ICS) network. In many cases, micro-segmentation is required to only permit authorised communications between devices.
  2. Control network access by consistently monitoring what is connecting to the network and verifying each device’s security posture before it can be connected.
  3. Demand seamless visibility across all networks and devices the business uses for security monitoring and management. This should be centralised so that all devices, networks, risks, traffic, and policies can be viewed and managed across both the production and IT environments in real-time.
  4. Use an intrusion protection system (IPS) to help detect attacks and provide virtual patching of IoT and IIoT devices. At the same time, deploy active protection solutions and deception technology to counter unknown threats.
  5. Use automatic secure remote access through zero trust so everyone on the network is verified and applications remain secure no matter where authorised users are located.

When adopting security solutions, it’s important to ensure they can automatically scale with business needs. This includes adapting to network changes, anticipating and proactively managing threats, and providing real-time threat intelligence.

A new generation of security tools is achieving this by delivering better visibility of the network environment while automatically responding to compromised devices or suspicious activity. These tools directly meet operational and regulatory needs by providing centralised management and a unified context-aware security policy that delivers granular control and visibility across all devices and networks. In this way, both current and emerging IoT and IIoT security solutions can ensure the integrity and protection of assets in the automated organisation, futureproofing it against emerging cyber threats.

*Wavelink is a Fortinet distributor

Related stories
Top stories
Story image
Tech job moves
Tech job moves - Cohesity, Equinix, IDC, Proofpoint & Xero
We round up all job appointments from July 29 - August 5, 2022, in one place to keep you updated with the latest from across the tech industries.
Story image
Firewall
Fortinet unveils compact firewall for hyperscale data centres, 5G networks
"Fortinet’s dedication to pushing the boundaries of what is possible in security performance has yielded the most powerful compact firewall yet."
Story image
Enterprise
Fortinet reports second quarter 2022 financial results
“We delivered strong revenue and billings growth in the second quarter driven by an increase in the number of transactions larger than one million dollars."
Story image
Mergers and Acquisitions
Netskope acquires Infiot, delivers integrated SASE platform
Converged SASE platform provides AI-driven zero trust security and simplified, optimised connectivity to any network location or device, including IoT.
Story image
SaaS
Why is MACH architecture a new big thing in the tech world?
More and more global enterprises are considering replacing the monolithic tech stack with the best-of-breed composable stack that enables greater business agility.
Story image
Cloud
TBC Bank decreases time to market for new offerings by 40%
TBC Bank has reduced time to market for new and enhanced products and services by 40% since implementing Kong Enterprise, the cloud native API platform. 
Story image
Data
NOVATION releases cloud-based solution to maximise value of data
NOVATION has announced the release of DataVio, its cloud-based solution for helping businesses automate the processing and extraction of data.
Story image
SAP
OutSystems joins SAP PartnerEdge program, integrates solutions
OutSystems has become an official member of the SAP PartnerEdge program. This will make it easier for other businesses within the SAP ecosystem to discover and connect with OutSystems.
Story image
Appointments
Tech job moves - Checkmarx, Kinly, Syniti, Trellix & WalkMe
We round up all job appointments from July 22-28, 2022, in one place to keep you updated with the latest from across the tech industries.
Story image
Ransomware
Majority of execs in SEA anticipate ransomware attacks
Kaspersky's study uncovers that more than half believe a ransomware attack against their business is too small to worry about.
Story image
Partnership
NCS, FPT Software launch Strategic Delivery Centre in Vietnam
The new partnership is designed to support increasing demand for high quality digital services across the region.
Story image
Internet of Things
AI-Link chooses Keysight offering to validate 5G performance
AI-Link has chosen Keysight Technologies' 5G test tools for end-to-end performance validation of cloud-native 5G radio access network (RAN) equipment.
Story image
SaaS
ManageEngine unveils SaaS availability of Analytics Plus
ManageEngine's Analytics Plus is now available as a software as a service (SaaS) offering, enabling users to set up a completely functional and integrated analytics platform anywhere in under a minute.
Story image
Product Management
TeamViewer and Siemens to innovate product lifecycle space with AR
TeamViewer's new partnership with Siemens Digital Industries Software to bring the power of TeamViewer's AR platform, Frontline, to Siemen Teamcenter software.
Story image
Compliance
Why security needs to shape your journey to the cloud
It's estimated that 80% of workloads could be in the cloud in the next few years. How can you make all that data secure?
AWS Marketplace
Watch this webinar to gain building blocks for data mesh, and how AWS customers today are successfully enabling domain driven data.
Link image
Story image
Data Centre Maintenance / Management
Vertiv releases update to Smart InfraSight platform
Vertiv has unveiled an update to its Smart InfraSight data centre management platform, featuring improved intelligence and the ability to manage multiple IT devices.
Story image
Cybersecurity
Qualys develops EASM capabilities for Cloud Platform
"Qualys unique approach to EASM is integrating the internal and external asset data from CyberSecurity Attack Management with its VMDR solution into a single view."
Story image
Hybrid Cloud
The essential guide to digital transformation by SolarWinds
Digital transformation is a buzzword thrown around all the time by companies, but what does it actually mean and why is it important? SolarWinds breaks it down.
Story image
SaaS
OpenText launches new solutions on Salesforce AppExchange
Included in this latest launch is OpenText Core Content, a Content Services platform that customers can leverage to effectively manage their content.
Story image
Ransomware
Ivanti and SentinelOne partner on patch management solution
Ivanti and SentinelOne will integrate their technologies Ivanti Neurons for Patch Management and SentinelOne's Singularity XDR platform.
Story image
Remote Working
Four-day week: Perceptions across Asia Pacific and Japan
Workers across APJ want to be empowered to do their best work, wherever and whenever they want.
Story image
Data Protection
CyberRes partners with Google Cloud in lead up to BigQuery release
CyberRes, a Micro Focus line of business, has announced a partnership with Google Cloud to support the upcoming release of BigQuery remote functions.
AWS Marketplace
See how managed security services (MSS) have evolved to Managed Detection and Response (MDR) and Extended Detection and Response (XDR). Learn how these new holistic solutions can simplify security management and improve your threat detection and response.
Link image
Story image
Indusface
Why enhancing bot protection for web and API endpoints matters
The trouble with bots is that they aren’t all bad. Unfortunately, this can make it challenging to detect malicious bots that find their way into your system and threaten your business.
Story image
Cybersecurity
FirstWave responds to SMB demand for better cybersecurity
FirstWave developed the CyberCision Open Security Management Platform to respond to SMBs 'urgent' need for comprehensive cyber protection.
Story image
Cybersecurity
More than a fifth of cybersecurity teams ban the use of public WiFi
Verizon’s fifth annual Mobile Security Index report has revealed a continued rise in significant cyberattacks in the last year involving a mobile/IoT device.
Story image
Radware
Good or bad - answer these questions to check application visibility
With the adoption of the hybrid cloud, applications now run in multiple private and public cloud environments managed by different teams and tools.
Story image
SAP
Microsoft unveils two new security products to help reduce attack surfaces
The products are set to give companies deeper insights into threat actor activity and help them successfully navigate the changing threat landscape.
Story image
Healthcare
SOTI research explores professional's thoughts on digitisation in the healthcare sector
Interconnectivity, automation and data management were the three key trends highlighted in the report as integral parts of successful medical technology implementation.
Story image
Data
Hazelcast launches beta release of new serverless offering
Hazelcast Viridian Serverless speeds up app development, simplifies provisioning, and enables integration of real-time data into applications.
Story image
API
Security gaps in APIs plague organisations - study
Together, the findings highlight that existing solutions and API security tactics focused on shift-left strategies are failing to adequately protect APIs.
Story image
Digital Transformation
Government needs content services aligned for better customer experience
Organisations across all industries in the private sector have made significant progress in digital transformation. The public sector, however, has not always kept up with the pace.
AWS Marketplace
Learn how security orchestration, automation, and response (SOAR) enhances your security strategy.
Link image
Story image
Apps
Freshworks integrates with Google's Business Messages
"The integration with Freshworks makes it fast and easy for businesses to have conversations with their customers within the Google apps."
Story image
Robotic Process Automation / RPA
Gartner anticipates RPA software revenue of US$2.9 billion
Gartner predicts global robotic process automation (RPA) software revenue to reach US$2.9 billion in 2022, an increase of 19.5% from 2021.
Story image
10 Minute IT Jams
Video: 10 Minute IT Jams - An update from Incode Technologies
Jonathan Andresen joins us today to discuss the identification and authentication solutions offered by Incode.
Story image
Infrastructure
New developments for cable set to connect South America to APAC and Oceania
Further proposals have been issued to begin construction of the almost 15,000 km subsea Humboldt Cable cable, which connects South America to APAC and Oceania.
Story image
CRM
Forrester names Pega a Leader in CRM Solutions 2022 report
Forrester Research has named Pega a Leader among 11 competitors in The Forrester Wave: Core CRM Solutions, Q3 2022 report.
Story image
SaaS
Viavi updates Observer platform to simplify cloud monitoring
Version 18.8 simplifies cloud monitoring with data centre-like visibility, bringing two key capabilities to cloud-based applications and deployments.
Story image
Healthcare
Why the Metaverse could be the key to enhancing the healthcare sector
The experts at Accenture understand that the programmable world is about building the next version of the physical world in healthcare, understanding complex layers in order to fully utilise technology to its maximum effect.