Securing IoT and OT: are you committing this cardinal mistake?

By |

According to a report in the Tech Republic, companies have been relaxing their cybersecurity controls during the pandemic. While this is an obviously and patently a wrong move, research by Subex has revealed an embedded reason behind the emergence of such practices.

When companies began asking employees to work from home. Cybersecurity team suddenly had to deal with an explosion of threat surfaces. Some small and medium businesses also started using untested communication and collaboration applications that compounded the security problem. With teams being distracted, hackers found it easier to slip deceptive emails through and thus began a long chain of breaches. Some of them continue to this day.

Cybersecurity threats

Businesses often fear that security solutions could end up slowing them down. The perceived lack of digital empathy in systems and processes designed to improve cybersecurity gives businesses the impression that productivity and efficiency need to be sacrificed to secure their businesses. Even small hurdles such as a small lag in getting data are turning to be significant barriers for increasing the level of cybersecurity or enforcing it more stringently.

Digital empathy, therefore, needs to underpin the development of security tools so that such perceptions are addressed.

Is this true for your business as well?

Defense-in-depth with digital empathy
Subex Secure is a mature solution that is built with digital empathy at its core. While we offer the highest levels of IoT and OT cybersecurity, we also ensure that your employees never have to turn a function off or degrade the overall cybersecurity posture to gain efficiency. Here is a testament to this statement. Subex Secure, works for you and with you

Connect with to learn how you can address the most potent threats and vulnerabilities and become more cyber resilient.

Read our latest threat landscape report to learn about cyber threats you need to know about.


Prayukth K V has been actively involved in productizing and promoting cross eco-system collaboration in the emerging tech and cybersecurity domains for over a decade. A marketer by profession and a published author, he has also proposed and promoted critical infrastructure protection strategies that rely on in-depth threat research and deflection strategies to deceive hackers and malware. Having been at the frontlines of cyber securing infrastructure, Prayukth has seen cyberattacks and defense tactics at close quarters.

Subscribe to Newsletter

Related Posts

Protect your IoT, OT and converged assets with Sectrio