ITC Security Threat of the Week – Week 25: Everything is being hacked!

 In ITC's Threat of the Week

Everything is being hacked!
Just this week we’ve seen reports of ‘Smart Toilets’ hacked in Japan, I hope the developers of that system covered their bums! Vulnerabilities have been found in some computer controls for luxury cars. More and more devices are able to connect wirelessly to each other and your corporate networks, this is being referred to as the Internet of Everything which means the points of attack are growing exponentially. Cisco defines the Internet of Everything (IoE) as bringing together people, process, data, and things to make networked connections more relevant and valuable than ever before-turning information into actions that create new capabilities, richer experiences, and unprecedented economic opportunity for businesses, individuals, and countries. They also estimate that by 2015 as many as 15 billion devices will be connected to the Internet —more than double the world’s population. One forecast suggests that the number of such devices will reach 50 billion by 2050, and that is almost certainly an underestimate.
(Discussion)
More and more corporate and private devices are connecting to the internet and to each other without the complicated set-up required. Almost anyone can get their phone to access their corporate email if it is opened up, the phone does the complicated configuration for you. Some of us over thirty remember the difficulty in programing a VCR to record a TV show, now look you can program your favourite show to record on your set-top box entirely from your smart phone. And you will most likely be reminded to do this from an email telling you your favourite show is on tonight.
Most people today have a smart phone, tablet, and laptop that they will use for personal and business. The challenge is for network and security professionals is to know what’s connected to your network and to have some say in how, when and where on your network you allow these devices depending on information gathered during a posture assessment.
(Recommendation)
No matter what your corporate policy says, either allowing BYOD or not with ITC Secure Networking and our comprehensive suite of services which can be tailored to your needs, you can be assured that you will know what’s connected to your network and have the option to allow full, controlled or no access to your network, applications and data. If you would like to learn more, please get in contact at [email protected] or call 020 7517 3900.

Author: Kevin Whelan

Recent Posts

Leave a Comment

Tel:
+44 (0) 20 7517 3900

 

Contact ITC Secure

If you have a question, request, comment or requirement, please send us an email now and we will get back to you by return

Big Data IT Security Specilists