Insulating Your Organization from Internal Attack
A friendly connection can be a gateway for intrusion. Case in point: We should all feel a healthy dose of paranoia when we think about connecting our devices to a network or the web, regardless if they seem friendly. A frequently mentioned example involves hackers gaining access to a casino’s database of high-esteem visitors by going through a smart thermostat used to regulate the temperature of a lobby fish tank.
One doesn’t have to go knocking on the main (and well-protected) entrance to get in—all one has to do is find an unsecured point to crawl through the back door to get to the goodies and then take them out through the same way. The simplicity of modern devices and the functions they perform often lays the groundwork for an inexpensive solution—one that, in order to remain easy to use and affordable, often does not employ innate privacy and security protections.
The ease of use and installation can make complex tasks easy to take charge of and manage, but that can also make it easier for those who are “in the know” to circumvent controls and gather privileged, confidential and private information.
There have already been a number of articles out there warning of how the Internet of Things (IoT) has opened a Pandora’s box for hackers and wannabe thieves and extortionists; however, we still hear about simple
Please log in or sign up below to read the rest of the article.