Edge & IoT Security

IoT Devices: Invisible Security Threats

IoT devices and sensors can simplify life and work. But they can also pose a big security threat to the organization. Most people do not think of IoT devices are computers but appliances. Most people attribute cyber-security as a concern only with computers and not with appliances. This erroneous perception has led to massive deployment of IoT devices in homes and organizations without regard to securing them.

IoT (Internet of Things) devices, if not implemented right, can pose a major threat to the organizations’ network and its users. Because IoT devices are often inexpensive and connected to the network, they are not often systematically examined against threat potentials. There have been real-world examples that clearly demonstrate the threat posed by bad system design involving IoT devices.

IoT Devices That Have Been Attacked Before

Example of IoT devices that have been compromised and used as launch pad for further security attacks are:

  • Security surveillance cameras
  • Smart bulbs
  • Environment sensors like temperature, humidity and pressure sensors
  • Connected vehicles
  • Connected solar panels
  • SCADA (Supervisory Control and Data Acquisition) devices
  • HVAC systems
  • Access control systems like smart locks, RFID readers and turnstiles.

IoT Security Solutions

IoT Device Inventory

Consulting and professional services to detect and inventory all IoT devices in the network. Final report with complete information about these devices like:

  • Physical location
  • UUID
  • Network address
  • Type
  • Description
  • Purpose/intent
  • Manufacturer
  • Model
  • Serial Number
  • Firmware Version

IoT Device Vulnerability Assessment

Consulting and professional services to vulnerability assessment of IoT devices in the network. Final report includes detailed information including:

  • Vulnerable device
  • Description of vulnerability
  • Severity of the vulnerability
  • Exploitability of the vulnerability
  • Protocols involved
  • Crypto ciphers involved
  • Remediations and Workaround Options