Springe zum Hauptinhalt

Mega-Menü-Produkt-Services_Pfeil

HYPERSECURE PlatformZero Trust Strategy

 

COMPLIANCE

Mega-Menü-Blog_Pfeil

News, Information AND Tips ABOUT IT SecurityTo the Blog
Support
Service Desk Partner  Portal

 

Mega-Menü-Blog_Pfeil

News, Information and Tips about IT SecurityTo the Blog

2 min read

Avoid Cyber Risks In IOT and IIOT Worlds

Avoid Cyber Risks In IOT and IIOT Worlds

 

What IoT and IIoT means today


The Internet of Things (IoT) extends network connectivity from computers, mobile phones and tablets to a variety of more simple objects which utilise internet technology to communicate and interact with the external environment
. These devices may include security systems, cars, electronic appliances, vending machines and more. 
Have you been on a train or bus and are able to track the whereabouts of the vehicle through a mobile app? Yes, apps such as TripView app utilise IoT technology to transfer GPS data straight into your mobile. 

IOT - Word on the Place of Missing Puzzle Piece through Magnifier. Selective Focus.

The Industrial Internet of Things (IIoT), on the other hand, is more for efficiency and businesses rather than the user-centric nature of IoT. IIoT connect machines and devices in the manufacturing, utilities and other industries. It enhances manufacturing processes by incorporating machine learning technologies and automated machine to machine communication. It affords businesses predictive maintenance, predicting defects before they occur to ensure a proficient and cost-effective result. 

However, unlike IoT, system failures and downtime in IIoT deployments can result in high-risk emergency situations if an incident was to occur.

IoT and IIoT security breaches 


The General Data Protection Act (GDPR) extends to IoT devices and networks. GDPR urges companies to take action! 

IoT and IIoT devices and systems which hold personal data could include a consumer device or an organisation application, such as connected medical equipment. Any security breach likely to result in a risk to the rights and freedoms of individuals, for example if the data has been accessed by an unauthorised source, must be reported right away. If not done within 72 hours of becoming aware of the incident, or you would face GDPR fines.

On top of worrying about data breach, the IoT network opens up the grid to malicious cyberattacks. A compromised network does not only mean access to private banking details, but access to public infrastructures such as traffic lights, GPS tracking systems and power plants could fall prey to hackers. Gartner stated that by the year 2020, 20 billion network-connected things can be hacked and compromised. 

Also, consider this: you are a manufacturing company who utilises and relies on robots for efficient machine-produced products. If a hacker or an unknowing employee was to insert a USB device with malware then, at the very least, the operation of your machinery will be compromised. What is to stop this malware from running through your entire computer system, especially if this can impact on the general public safety.

The exponential growth of IIoT devices has lead to an increased demand for fully-integrated security solutions in the industrial segment.

 

How DriveLock can help


IIoT operations leave a much larger space open to cyberattack. In the industrial sector, large amounts of data are sent to the cloud for analysis and used by different applications. These applications also communicate with physical devices. Significant numbers of IIoT devices are not being used with security in mind. DriveLock currently offers the best solutions for IIoT industrial machinery technology, with further support for personal devices and smart homes. We are leading the market as an endpoint security company who specialises in the IIoT sector, given the increasingly large role this technology has in the industry segment. 

With DriveLock IIoT, you can expect a multi-layered approach to security including Device Control, Application Control, Encryption, Security Education and more. We provide protection for Industrial Control Systems (ICS) to ensure the safe operation of your machines, to protect you from internal and external threats. With Information Technology (IT) and Operations Technology (OT) increasingly connected, it is important to prevent potential disruptions which can result in technological and physical harm. 

 

Microsoft Exchange hack - when the patch came, it was already too late

Microsoft Exchange hack - when the patch came, it was already too late

Among a high-profile wave of cyberattacks in March 2021, tens of thousands of email servers worldwide fell victim due to a vulnerability in the...

Read More
Comment on Bluetooth vulnerability Blueborne

Comment on Bluetooth vulnerability Blueborne

Dear readers, News of a security vulnerability in Bluetooth connections caused a furore last week among manufacturers and users of Bluetooth-enabled...

Read More