bridgera.com Open in urlscan Pro
162.159.135.42  Public Scan

Submitted URL: http://0w56z.mjt.lu/lnk/AVwAABQcicAAAAADB7YAABSp_5MAAAAAr8MAAPwxABjkegBhwfmMkelr7kIYTMmckpmbrzz7YwAYQLQ/6/oEDlqZ089C...
Effective URL: https://bridgera.com/iot-security-challenges-and-solutions/
Submission: On December 21 via manual from US — Scanned from DE

Form analysis 4 forms found in the DOM

POST

<form id="mc4wp-form-1" class="mc4wp-form mc4wp-form-2309 mc4wp-form-basic" method="post" data-id="2309" data-name="Blog Form">
  <div class="mc4wp-form-fields"><!-- Begin MailChimp Signup Form -->
    <link href="//cdn-images.mailchimp.com/embedcode/horizontal-slim-10_7.css" rel="stylesheet" type="text/css">
    <style type="text/css">
      #mc_embed_signup {
        background: #fff;
        clear: left;
        font: 14px Helvetica, Arial, sans-serif;
        width: 100%;
      }

      /* Add your own MailChimp form style overrides in your site stylesheet or in this style block.
	   We recommend moving this block and the preceding CSS link to the HEAD of your HTML file. */
    </style>
    <div id="mc_embed_signup">
      <div id="mc_embed_signup_scroll">
        <h3>Subscribe to Bridgera's newsletter.</h3>
        <p style="font-weight: 400;font-family: 'Raleway', sans-serif;line-height: 1.5em;">Get Bridgera's latest articles straight to your inbox.</p>
        <input type="email" style="margin-bottom: 10px;" value="" name="EMAIL" class="form-control" id="mce-EMAIL" placeholder="Email Address" required="">
        <!-- real people should not fill this in and expect good things - do not remove this or risk form bot signups-->
        <div style="position: absolute; left: -5000px;" aria-hidden="true"><input type="text" name="b_2c5164d14d3107c035ce186fb_7cc13e8adc" tabindex="-1" value=""></div>
        <div class="clear"><input type="submit" value="Subscribe" name="subscribe" id="mc-embedded-subscribe" class="tm-button"></div>
      </div>
    </div>
    <!--End mc_embed_signup-->
  </div><label style="display: none !important;">Leave this field empty if you're human: <input type="text" name="_mc4wp_honeypot" value="" tabindex="-1" autocomplete="off"></label><input type="hidden" name="_mc4wp_timestamp"
    value="1640120023"><input type="hidden" name="_mc4wp_form_id" value="2309"><input type="hidden" name="_mc4wp_form_element_id" value="mc4wp-form-1">
  <div class="mc4wp-response"></div>
</form>

GET https://bridgera.com/

<form role="search" method="get" action="https://bridgera.com/" class="widget-search-form">
  <input type="search" placeholder="Search..." value="" name="s">
  <button type="submit"><i class="flaticon-magnifier"></i></button>
</form>

POST /iot-security-challenges-and-solutions/#wpcf7-f9105-o1

<form action="/iot-security-challenges-and-solutions/#wpcf7-f9105-o1" method="post" class="wpcf7-form theme_1 errorMsgshow init" novalidate="novalidate" data-status="init">
  <div style="display: none;">
    <input type="hidden" name="_wpcf7" value="9105">
    <input type="hidden" name="_wpcf7_version" value="5.4.2">
    <input type="hidden" name="_wpcf7_locale" value="en_US">
    <input type="hidden" name="_wpcf7_unit_tag" value="wpcf7-f9105-o1">
    <input type="hidden" name="_wpcf7_container_post" value="0">
    <input type="hidden" name="_wpcf7_posted_data_hash" value="">
    <input type="hidden" name="_wpcf7_recaptcha_response"
      value="03AGdBq24S3-8Zi1EiqP4HNT3xPpP-LqMVnLjMg18hO7jJx7NaI6a0ALECKefFvAAl0uHqJtjc4vVI0YT3tEZ-CP68UapLdHCF0ypn4xyj9LdBY7bby925L7uZ_U7ZnHxHeewgl8CPpTP6cLsrNsqVWNb4Mz1RA55p_KoB9o6gvrcRoCoe1POOLx6ONCne1Iuzs51kTEqTlSNOaINhH6BQ-Eqre8lXa24Sno1Lgl1QrOkALVjHePdQsahnJgeCJBRHw-8712g25xoMnpCdQktD3jwqrAYlH3JCRwH9odJY4FtwhNlm30kccvvHyL7cI8mGFpyIgaq2CHrb6HxHWMEq7agNgq_Ss-lbyORBJtBuXAH-LJE20QludTM5kPT9sagkbUJEyEZLaQK9ZtKWu2ro39h9IKR6bqjxdG-dC0NN4GA7sjTV-OS4oGDL2hEJizvNvWrNw8YnLUyiluEmz778xWT7Xf3ld-d7yQ">
  </div>
  <div class="tm-contact-formfield">
    <span class="wpcf7-form-control-wrap firstName"><input type="text" name="firstName" value="" size="40" class="wpcf7-form-control wpcf7-text wpcf7-validates-as-required required" aria-required="true" aria-invalid="false"
        placeholder="First Name*"></span>
  </div>
  <div class="tm-contact-formfield">
    <span class="wpcf7-form-control-wrap lastName"><input type="text" name="lastName" value="" size="40" class="wpcf7-form-control wpcf7-text wpcf7-validates-as-required required" aria-required="true" aria-invalid="false"
        placeholder="Last Name*"></span>
  </div>
  <div class="tm-contact-formfield">
    <span class="wpcf7-form-control-wrap emailId"><input type="email" name="emailId" value="" size="40" class="wpcf7-form-control wpcf7-text wpcf7-email wpcf7-validates-as-required wpcf7-validates-as-email required email" aria-required="true"
        aria-invalid="false" placeholder="Email ID*"></span>
  </div>
  <div class="tm-contact-formfield">
    <span class="wpcf7-form-control-wrap companyName"><input type="text" name="companyName" value="" size="40" class="wpcf7-form-control wpcf7-text wpcf7-validates-as-required required" aria-required="true" aria-invalid="false"
        placeholder="Company Name*"></span>
  </div>
  <div class="tm-contact-formfield">
    <span class="wpcf7-form-control-wrap phoneNumber"><input type="tel" name="phoneNumber" value="" size="40" class="wpcf7-form-control wpcf7-text wpcf7-tel wpcf7-validates-as-required wpcf7-validates-as-tel required" aria-required="true"
        aria-invalid="false" placeholder="Phone Number*"></span>
  </div>
  <div class="tm-contact-formfield">
    <span class="wpcf7-form-control-wrap message"><textarea name="message" cols="30" rows="5" class="wpcf7-form-control wpcf7-textarea" aria-invalid="false" placeholder="Message"></textarea></span>
  </div>
  <div class="tm-contact-formfield mt-4">
    <div class="form-check pl-0 text-center">
      <p>Bridgera will use any of the data provided in accordance with the <a href="https://bridgera.com/privacy-policy/" target="_blank"> Privacy Policy.</a></p>
    </div>
    <p> <input type="submit" value="Get In Touch" class="wpcf7-form-control wpcf7-submit tm-button submit-btn btn-block"><span class="ajax-loader"></span>
    </p>
  </div>
  <div class="wpcf7-response-output" aria-hidden="true"></div>
</form>

POST

<form id="mc4wp-form-2" class="mc4wp-form mc4wp-form-2309 mc4wp-form-basic" method="post" data-id="2309" data-name="Blog Form">
  <div class="mc4wp-form-fields"><!-- Begin MailChimp Signup Form -->
    <link href="//cdn-images.mailchimp.com/embedcode/horizontal-slim-10_7.css" rel="stylesheet" type="text/css">
    <style type="text/css">
      #mc_embed_signup {
        background: #fff;
        clear: left;
        font: 14px Helvetica, Arial, sans-serif;
        width: 100%;
      }

      /* Add your own MailChimp form style overrides in your site stylesheet or in this style block.
	   We recommend moving this block and the preceding CSS link to the HEAD of your HTML file. */
    </style>
    <div id="mc_embed_signup">
      <div id="mc_embed_signup_scroll">
        <h3>Subscribe to Bridgera's newsletter.</h3>
        <p style="font-weight: 400;font-family: 'Raleway', sans-serif;line-height: 1.5em;">Get Bridgera's latest articles straight to your inbox.</p>
        <input type="email" style="margin-bottom: 10px;" value="" name="EMAIL" class="form-control" id="mce-EMAIL" placeholder="Email Address" required="">
        <!-- real people should not fill this in and expect good things - do not remove this or risk form bot signups-->
        <div style="position: absolute; left: -5000px;" aria-hidden="true"><input type="text" name="b_2c5164d14d3107c035ce186fb_7cc13e8adc" tabindex="-1" value=""></div>
        <div class="clear"><input type="submit" value="Subscribe" name="subscribe" id="mc-embedded-subscribe" class="tm-button"></div>
      </div>
    </div>
    <!--End mc_embed_signup-->
  </div><label style="display: none !important;">Leave this field empty if you're human: <input type="text" name="_mc4wp_honeypot" value="" tabindex="-1" autocomplete="off"></label><input type="hidden" name="_mc4wp_timestamp"
    value="1640120023"><input type="hidden" name="_mc4wp_form_id" value="2309"><input type="hidden" name="_mc4wp_form_element_id" value="mc4wp-form-2">
  <div class="mc4wp-response"></div>
</form>

Text Content

Request a Demo
 * 1-919-230-9951
 * info@bridgera.com

 * Login |
 * 
 * 
 * 
 * 
 * 

 * Services
   * IoT Service Enablement
   * Custom Software
   * Analytics & Intelligence
 * Solutions
   * Healthcare
   * Industrial
   * Personal Security
   * Tracking
 * Products
   * myHealth
   * Rescue
   * WellAware CARE powered by Bridgera
 * Ecosystem
   * Customers
   * Partners
 * Resources
   * Blogs
   * Videos
   * News & Events
   * Case Studies
 * Contact
 * Get a Free Consultation




IOT SECURITY – CHALLENGES AND SOLUTIONS

By Joydeep Misra November 11, 2021


If the mere mention of IoT security leaves you feeling uneasy, you’re neither
alone nor unjustified. Forbes has reported that the number of malware incidents
targeting IoT devices leapt from 813 million in 2018 to 2.9 billion the
following year. During that same time period, a NETSCOUT intelligence report on
IoT security issues, ominously titled Dawn of the Terrorbit Era, found that
devices were attacked by malicious actors within five minutes of being connected
to the Internet.

The volume and sophistication of those attacks have only risen as IoT adoption
increases among both consumers and industry. In its IoT – The Internet of
Transformation 2020 white paper, Juniper Networks estimated that the total
number of IoT connections will hit 83 billion by 2024. Those billions of devices
will be an attractive target for malicious actors, which in turn will introduce
new IoT security challenges while intensifying existing ones.

This has made IoT network security a prime consideration for organizations that
want to benefit from automation and efficiency without exposing themselves to
undue risk. However, that heightened awareness doesn’t always lead to action. As
part of its research for the 2020 Unit 42 IoT Threat Report, Palo Alto Networks
found that “98% of all IoT device traffic is unencrypted, exposing personal and
confidential data on the network.” 

Compounding these IoT security problems is the fact that no standard guidelines
on IoT security exist. This means that even well-intentioned organizations that
are willing to allocate the necessary funding and resources to cybersecurity
will only find a few white papers outlining best practices or offering
recommendations from the IT community.


IOT SECURITY ISSUES AND WHY THEY EXIST

To overcome the many challenges for secure IoT, we first have to understand the
nature of IoT security issues.

Generally, organizations put all their IT resources (e.g., servers, computers,
printers) behind a firewall. Cloud-service providers allow them to create secure
pipelines (e.g., VPNs) to communicate with the cloud infrastructure outside the
organization. All of this infrastructure—that is, on-prem, cloud and hybrid—then
falls under the supervision of the IT team, who ensure that among other things
data communication to and from the servers is fully encrypted. This makes it
harder for malicious actors to access that data and steal sensitive information.

But anyone who reads the headlines knows that data breaches still occur.
Infamously, Home Depot was broadsided by point-of-sale (PoS) malware in 2014,
one year after Target suffered the same kind of attack. The personal information
of tens of millions of customers was compromised. Hackers were able to do this
by identifying vulnerabilities in “benign” networked devices and exploiting
those overlooked endpoints.

In other words, the large organizations were too focused on big, obvious
targets, such as their corporate servers, at the expense of IoT network
security. It’s akin to investing in a high-tech alarm system and then leaving
the basement window open.


THE CHALLENGES FACING IOT SECURITY

That analogy is helpful in shedding light on why IoT and security issues seem to
go hand in hand. Because IoT infrastructure consists of many small, often
inexpensive physical endpoint devices such as sensors or switches, it’s easy to
underestimate the risk that they pose. Comprehensive IoT security solutions
therefore have to account for all these devices and provide a practical
framework for addressing any vulnerabilities.

In order to eliminate or at least mitigate IoT network security issues, here are
some of the biggest oversights, mistakes and technological hurdles that need to
be overcome:

 * Security as an afterthought: According to a survey of 1,000 executives
   conducted by PwC, 93% stated that IoT’s benefits to their organization
   outweighed its risks. Only 48% were concerned about possible IoT security
   issues. IoT and security should instead be treated like two sides of the same
   coin. IoT security solutions need to be co-developed alongside IoT
   deployments and implemented as a whole.
 * A lack of standard IoT security best practices: Industry leaders, government
   agencies, recognized IT experts and advocacy groups ought to collaborate and
   design a common checklist of IoT security recommendations for organizations
   to follow. Think of something like the NSA’s best practices for mobile
   devices or home networks but designed specifically for IoT network security.
 * Low-powered devices: One of the things that makes IoT devices so inexpensive
   is their limited processing power and storage space. Unfortunately, that
   sometimes leads manufacturers to cut corners on their codebase, which leaves
   loopholes in the devices’ firmware. Lest they be flagged as potential IoT
   security problems, essential or “frontline” IoT devices should support
   standard security best practices, such as public key infrastructure (PKI).
 * Short device lifespans: As another cost-cutting measure, manufacturers tend
   to view IoT equipment as short-term devices with limited useful lives. Aside
   from the e-waste this generates, it also leads to IoT security issues over
   the distribution and renewal of digital certificates. These digital
   certificates are essential for secure device authentication and validation,
   and they should ideally be updated for as long as the device remains in use.
 * Limited oversight: Organizations don’t always have standard operating
   procedures and adequate software tools to monitor and manage their IoT
   devices from a security standpoint. At the very least, these tools should be
   a part of any IoT security solutions that they develop and implement.
 * Prolonged response times to possible threats: A major side effect of limited
   oversight is that it prevents IT teams from identifying breaches or
   responding quickly to attacks. Of all the IoT network security issues
   highlighted here, this represents the last line of defense. IT teams need to
   have the ability to easily zero in on a malware-infected device, revoke its
   digital certificate immediately and quarantine it to stem any further damage.


IDENTIFYING THE RIGHT IOT SECURITY SOLUTION

With so many concerns surrounding IoT network security, you could be forgiven
for wondering if it’s worth implementing IoT at all. But the good news is that
IoT and security don’t have to be mutually exclusive. They can—and must—be fully
integrated parts of the same solution.

At Bridgera, separating IoT and security issues is fundamental to our entire
philosophy. When we develop a custom IoT solution, whether it’s for a logistics
use case or a healthcare implementation, we make a point of designing the risks
out of the system. IoT security is an integral part of our IoT service
enablement, not an add-on or an afterthought.

Do you already have an IoT solution in place that’s running up against some of
the IoT security challenges outlined above? Or maybe you’re planning to build
one but are worried about IoT security issues? Contact Bridgera today and
schedule a free call with one of our IoT experts today. We’ll work with you to
develop a custom IoT solution that’s cost-effective, full-featured and above all
secure.



 * Previous Post


SUBSCRIBE TO BRIDGERA'S NEWSLETTER.

Get Bridgera's latest articles straight to your inbox.



Leave this field empty if you're human:



SEARCH OUR BLOG




MOST RECENT

 * IoT Security – Challenges and Solutions
 * Optimizing Your Supply Chain with Industrial IoT Solutions
 * Condition Monitoring: A Pillar of Industry 4.0
 * Optimizing IoT Implementation Costs
 * IoT Rapid Prototyping: Why Is It Necessary?

PLANNING FOR A NEW IOT PROJECT?

Bridgera will use any of the data provided in accordance with the Privacy
Policy.





OUR PRODUCTS

BRIDGERA RESCUE

Mobile Personal Emergency Response System

BRIDGERA MYHEALTH

Telehealth & Remote Patient Monitoring

BRIDGERA TRACKME

Real-time driver & asset tracking

Previous Next
Request a Demo

Bridgera is a custom software development and service company specialized in
building Internet of Things solutions. Our mission is to help our customers to
reach their IoT goals faster by utilizing our proprietary tool set and deep
experience in the IoT field.

 * 
 * 
 * 
 * 

CONTACT US

 * 500 W Peace St, Raleigh, NC 27603, United States

 * info@bridgera.com

 * +1 919-230-4531 [Sales]

QUICK LINKS

   
 * News & Events
 * Our History & Mission
   
 * Get eBook Now
   
 * Privacy Policy
 * California Applicants
 * California Privacy Policy
 * Website terms of use

GET IN TOUCH


SUBSCRIBE TO BRIDGERA'S NEWSLETTER.

Get Bridgera's latest articles straight to your inbox.



Leave this field empty if you're human:


Copyright © 2021 Bridgera | www.bridgera.com