Blog

Improving IoT Security: 10 immediate actions to take

By |

In the last three days, cyberattacks have risen significantly across the board. Data from our global honeypot network analyzed by threat researchers point to a 70 percent rise in cyberattacks over baseline rates recorded last week. Projects involving IoT have a lot to worry about on the security front this week as most of the attacks we recorded were targeting them.

Going by past trends, we expect the volume of cyberattacks to continue to rise for the next 10-14 days. So there is an urgent need to increase cyber vigil and stay on alert.

In order to secure their IoT devices, networks, and data, we urge security teams to immediately deploy these measures, if they are not doing so already:

  • Investigate and verify access modes, mechanisms and confirm that passwords are not shared (within or outside the organization) and that all passwords used are unique
  • Ensure that all systems are patched and updated
  • Examine your infrastructure for inherent or acquired vulnerabilities. Conduct a deep vulnerability scan  
  • Gather visibility into the footprint of your operations and supply chain and request all stakeholders to conduct self-assessment checks as per the NIST CSF to ensure that all systems are hardened and secure
  • Ensure that all perimeter and non-perimeter-based defenses are working well
  • Stress-test your incident response plan and reexamine your roles and responsibilities matrix to ensure all roles and individuals are well aligned
  • Communicate the need for heightened security across the organization
  • Check all advisories from regulators and other authentic sources  
  • Subscribe to multiple sources of relevant cyber threat intelligence
  • Sensitize employees to keep an eye out for phishing attacks

Sectrio advises businesses to maintain Code Orange across the next 2 weeks till the volume of cyberattacks subsides. If needed, this enhanced state of alert can be continued for an extended period. All stakeholders need to be brought on onboard to ensure the effective execution of an enhanced cyber risk management plan.

Reach out to us to learn about specific strategies to protect your organization.

Learn about easy to deploy compliance kits to help your regulatory compliance initiatives.   

Sectrio is offering its threat intelligence feeds for trial for free for 15 days. Our feeds work with the best SIEM solutions out there and meet all the parameters listed above. To access our threat intelligence feeds for free, sign up now.

Talk to our cybersecurity experts to learn how Sectrio’s IoT security solution and threat intelligence can help your business

See how our OT-IoT-IT security solution can handle such threats to your enterprise. Book a no-obligation demo. 

Improve your cybersecurity through ot and iot focused threat intelligence feeds free for 15 days
Improving IoT Security: 10 immediate actions to take - Sectrio

Get access to enriched IoT-focused cyber threat intelligence for free for 15 days  

Ot and iot security standards and best practices for ciso's
Improving IoT Security: 10 immediate actions to take - Sectrio

Download our CISO IoT and OT security handbook  

Gain insights from the largest ot and iot focused honeypot network - sectrio
Improving IoT Security: 10 immediate actions to take - Sectrio

Access our latest Global Threat Landscape report  

prayukth
Prayukth K V has been actively involved in productizing and promoting cross eco-system collaboration in the emerging tech and cybersecurity domains for over a decade. A marketer by profession and a published author, he has also proposed and promoted critical infrastructure protection strategies that rely on in-depth threat research and deflection strategies to deceive hackers and malware. Having been at the frontlines of cyber securing infrastructure, Prayukth has seen cyberattacks and defense tactics at close quarters.

Subscribe to Newsletter

Related Posts

Protect your IoT, OT and converged assets with Sectrio