By Charles Leaver

Internet of Things will require greater vigilance about data leakage

The emergence of the Internet of Things has complicated data loss prevention strategies like never before. Institutions are bracing for waves of new networked devices that contain unsecured applications, and the pressure appears unlikely to reside.

A recent survey of 779 business leaders, conducted by The Economist’s Intelligence Unit and sponsored by microprocessor firm ARM, found that 75 percent of respondents were interested in the IoT. Exploration could continue as technologies such as gyrometers and accelerometers, which are critical for capturing data from smaller and more mobile devices, become more affordable.

While the IoT phenomenon is still in its early stages, enterprises must be aware of its impact on operations and security. With a large number of PCs, mobile devices, wearable tech and appliances to manage, these organizations will be exposed to many new attack vectors.

Georgia Tech University recently released a report highlighting the heightened data leakage and hacking risks that could emerge from IoT, complicating efforts aimed at setting up secure cloud-based systems. The sheer amount of data that will pass through institutional networks will make them appealing targets for cybercriminals.

“No matter how successful we have been, black hat operatives will continue to attack infrastructure at every angle possible, making cybersecurity a global issue for years to come,” stated GTRI Cyber Technology and Information Security Laboratory director Bo Rotoloni. “We must remain vigilant.”

More specifically, many organizations may be at risk because their cybersecurity suites do not contain a comprehensive index of malware signatures and may let serious threats slip through the cracks. However, they can address vulnerabilities with malware and suspicious binary detection solutions from Ziften. Designed to detect anomalous activity, these tools will be a key part of maintaining vigilance against the rising tide of threats.

Get the Blog Here