Cyber security news for all


    Software providers are still overwhelmed with the security of IoT devices in 2020

    Total global IoT security spending was last year almost 2 million dollars. The trend for the coming years is clearly growing up. Given the growing crime in this area, companies should act urgently.

    Regardless of whether dangerous backdoors in networks, a misconfiguration in a telecom router that leaked patient data or attacks on telephones, printers and video decoders by the state motivated hacker groups – the topic of security caused attention around the world. The fatal thing about it, is not just the sheer number of attacks, but the fact that manipulations of networked devices often go undetected. Around half of all companies are unable to detect security breaches on IoT devices at all. Ultimately, this is not surprising. Consider, the case of a commercially available network camera that fatally has standard user credentials. If an attacker gains access to the camera via this security hole and thus spies on premises or business secrets, how should those responsible notice this promptly?

    20 Percent Of Companies Have Been Affected By At Least One Iot Based Attack

    However, IoT crime is increasing, because security has been one of the biggest weaknesses in the cyber world. Even if the IoT is no longer in its infancy, this problem has remained. For manufacturers of IoT devices, the most important thing is the cheapest possible development and fast time market, which means that an effective review potential vulnerabilities are continuously neglected. The weekly headlines about IoT leaks are a good reflection of this situation, regardless of whether it concerns attacks on routers, wireless radio connections or intelligent devices. The potential target area is extremely diverse. Almost 20 percent of companies have been affected by at least one IoT based attack in the past three years.

    We cannot rely on the rationality of manufacturers and developers alone. That is why the state and industry associations are in demand here. You finally have to understand that the IoT is one of the weakest links in the IT infrastructure and that cybercriminals have become a focus of attention in recent years.

    Recent Articles

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox

    [tdn_block_newsletter_subscribe input_placeholder="Email address" btn_text="Subscribe" tds_newsletter2-image="730" tds_newsletter2-image_bg_color="#c3ecff" tds_newsletter3-input_bar_display="" tds_newsletter4-image="731" tds_newsletter4-image_bg_color="#fffbcf" tds_newsletter4-btn_bg_color="#f3b700" tds_newsletter4-check_accent="#f3b700" tds_newsletter5-tdicon="tdc-font-fa tdc-font-fa-envelope-o" tds_newsletter5-btn_bg_color="#000000" tds_newsletter5-btn_bg_color_hover="#4db2ec" tds_newsletter5-check_accent="#000000" tds_newsletter6-input_bar_display="row" tds_newsletter6-btn_bg_color="#da1414" tds_newsletter6-check_accent="#da1414" tds_newsletter7-image="732" tds_newsletter7-btn_bg_color="#1c69ad" tds_newsletter7-check_accent="#1c69ad" tds_newsletter7-f_title_font_size="20" tds_newsletter7-f_title_font_line_height="28px" tds_newsletter8-input_bar_display="row" tds_newsletter8-btn_bg_color="#00649e" tds_newsletter8-btn_bg_color_hover="#21709e" tds_newsletter8-check_accent="#00649e" embedded_form_code="YWN0aW9uJTNEJTIybGlzdC1tYW5hZ2UuY29tJTJGc3Vic2NyaWJlJTIy" tds_newsletter="tds_newsletter1" tds_newsletter3-all_border_width="2" tds_newsletter3-all_border_color="#e6e6e6" tdc_css="eyJhbGwiOnsibWFyZ2luLWJvdHRvbSI6IjAiLCJib3JkZXItY29sb3IiOiIjZTZlNmU2IiwiZGlzcGxheSI6IiJ9fQ==" tds_newsletter1-btn_bg_color="#0d42a2" tds_newsletter1-f_btn_font_family="406" tds_newsletter1-f_btn_font_transform="uppercase" tds_newsletter1-f_btn_font_weight="800" tds_newsletter1-f_btn_font_spacing="1" tds_newsletter1-f_input_font_line_height="eyJhbGwiOiIzIiwicG9ydHJhaXQiOiIyLjYiLCJsYW5kc2NhcGUiOiIyLjgifQ==" tds_newsletter1-f_input_font_family="406" tds_newsletter1-f_input_font_size="eyJhbGwiOiIxMyIsImxhbmRzY2FwZSI6IjEyIiwicG9ydHJhaXQiOiIxMSIsInBob25lIjoiMTMifQ==" tds_newsletter1-input_bg_color="#fcfcfc" tds_newsletter1-input_border_size="0" tds_newsletter1-f_btn_font_size="eyJsYW5kc2NhcGUiOiIxMiIsInBvcnRyYWl0IjoiMTEiLCJhbGwiOiIxMyJ9" content_align_horizontal="content-horiz-center"]