Weaponized Smart Devices and the Internet of Things

Published: May 31, 2017, 2:35 p.m.

Gartner predicts that through 2018, over 50 percent of Internet of Things (IoT) device manufacturers will not be able to address threats due to weak authentication practices. Millions of IoT devices — including everyday objects like routers, security cameras, DVRs, medical devices, cars and more — have already been infected with malware and repurposed as zombie armies by cyber attackers. As a result, the bandwidth of distributed denial of service (DDoS) attacks reached frightening levels in 2016, culminating with attacks of well over 600 Gbps.

Until device makers require unique passwords by default, it is up to us to protect ourselves. In this episode, host Cherie Caswell Dost speaks with Bryan Fischer, senior director, Forsythe Security Professional Services, about the ever-changing security challenges of IoT devices, and how organizations can mitigate associated risks.

Listen to the latest episode of And There You Have IT to learn:

  • How IoT continues to change the threat landscape.
  • The inherent and evolving risks that accompany smart devices.
  • How manufacturers are trying to shore up their devices.
  • How companies can take action against IoT-related risks.
  • Why robust authentication practices are critical.

Top 5 Cyber Security Predictions for 2017 – The security threat landscape continues to change and present new challenges. Here are five predictions for 2017 that are worth preparing for.

Mobile Device Security in the Workplace: 5 Key Risks and a Surprising Challenge – With well-supported mobility and security awareness programs, your organization can keep users happy and your network secure so you can compete in today’s mobile-first environment.

Forsythe Technology - For more than 40 years, Forsythe has helped companies succeed by working to optimize, modernize, and innovate enterprise IT. We develop solutions that make practical business sense from idea to implementation. We help champion innovation and deliver bottom-line results. We serve as the bridge, moving you from traditional to new IT. Whatever your business needs, we make it happen.