Blog

Essential IoT security measures for 2022

By |

Threats to IoT deployments grew significantly in 2021. According to Sectrio’s threat research team, the volume of complex cyberattacks on various IoT projects grew by a staggering 400 percent in the January to November time period of 2021. This is a cause for concern and highlights the need to act immediately to protect against such attacks, secure assets, and work towards shrinking the available threat surfaces.

Why will IoT security draw more attention in 2022?

Based on the data we are analyzing from our global honeypot network, attacks on IoT devices continue to grow. We are also expecting new forms of ransomware and breach tactics to be deployed to destabilize IoT deployments in the next 90-120 days based on the malware development cycles we have seen in the past. 

Here are a few steps that we recommend you can take to secure your IoT infrastructure in 2022:

  • Buy devices from authorized and credible suppliers only. This includes everything from CCTV cameras to monitoring and management devices. The supplier should ideally provide visibility into their supply chains including the suppliers and countries from where components are procured
  • Perimeter-based security is passe: your data and assets need to be secured through a zero-trust policy wherein trust are granted for a session only after credentials are established before a transaction. No device will have permanent access to any part of the network
  • Voluntarily adopt stringent standards: while IEC 62443, NERC CIP, NIST standards, and standards proposed by regional regulators can be adopted at level one, nothing should stop your organization from going well beyond these mandates to improve your compliance posture
  • Conduct a cybersecurity self-assessment run once a month to see how you are doing on various IoT security parameters and to figure out how you can improve.
  • Build cybersecurity plans that are at a unit level (device), assembly level (aggregation of connected systems), communications (network), storage (cloud)
  • Work with vendors who give maximum IoT cybersecurity coverage for your unique protocols and device, and data eco-system
  • Sensitize employees and other stakeholders on security issues
  • Let your SIEM work with threat intelligence that is specific to your industry and business context 
  • Scale up your IoT security solutions by having regular conversations with all stakeholders

Download our compliance kits to jump start your IoT security journey with the right steps

Talk to our cybersecurity experts to learn how Sectrio’s IoT security solution and threat intelligence can help your business

See how our OT-IoT-IT security solution can handle such threats to your enterprise. Book a no-obligation demo. 

Improve your cybersecurity through ot and iot focused threat intelligence feeds free for 15 days
Essential IoT security measures for 2022 - Sectrio

Get access to enriched IoT-focused cyber threat intelligence for free for 15 days  

Ot and iot security standards and best practices for ciso's
Essential IoT security measures for 2022 - Sectrio

Download our CISO IoT and OT security handbook  

Gain insights from the largest ot and iot focused honeypot network - sectrio
Essential IoT security measures for 2022 - Sectrio

Access our latest Global Threat Landscape report  

Avatar of prayukth k v
Prayukth K V has been actively involved in productizing and promoting cross eco-system collaboration in the emerging tech and cybersecurity domains for over a decade. A marketer by profession and a published author, he has also proposed and promoted critical infrastructure protection strategies that rely on in-depth threat research and deflection strategies to deceive hackers and malware. Having been at the frontlines of cyber securing infrastructure, Prayukth has seen cyberattacks and defense tactics at close quarters.

Subscribe to Newsletter

Related Posts

Protect your IoT, OT and converged assets with Sectrio