While the Internet of Things (IoT) has provided interconnectivity at an unprecedented rate, we must remain vigilant in the protection of sensitive business data. Cybersecurity is a rapidly increasing necessity that no longer can be ignored. The conveniences afforded by IoT devices also expose individuals to increases in identity theft. The simple truth is that any device connected to a network can be compromised.
According to Cybersecurity Ventures, over the next five years, global spending on cybersecurity products will exceed $1 trillion. As the amount of cloud-connected devices increase, so does the risk and lack of minimum-security standards. Hackers can access information through network-connected cars, appliances and even Closed-Circuit TV cameras. Below are some surprising examples of the realities of the world we share.
- In a July 23, 2018, story that appeared in The Daily Telegraph, ten years' worth of data belonging to some of the world's biggest carmakers including Fiat Chrysler, Toyota and Volkswagen was accidentally made available online on a server owned by a an outside specialist engineering company.
- Darktrace, a leading cybersecurity firm, told of an incident in which a casino’s security was compromised using a smart thermometer located within a fish tank. Once connected, the hackers had access to the high-stakes players and their information.
- The 2018 RSA Cybersecurity Conference had their mobile application compromised and personal information exposed on the first day.
- In 2016, Uber was criticized when more than 20 million people had their information exposed via a breach in a data storage service run by AWS.
- SVR Tracking, a vehicle recovery service, was breached using an unsecured cloud storage bucket, leaving 10 million VINs (vehicle identification numbers) available for public access and for thieves to manipulate for stolen cars.
- Verizon Wireless released a report that detailed how more than 5,000 IoT devices at a university were compromised via brute force attack and were making hundreds of DNS lookups (related to seafood) every 15 minutes.
As detailed above, security experts have quite a bit of work cut out for them to ensure every connected endpoint is secured. The good news is that Tech Data has the expertise and resources to strengthen your security practice and protect your customers. We’ve included a few tips below.
1. Get the Basics
Security threats are constantly changing. Whether you’re starting from the beginning or need a refresher, stay current. Tech Data offers online refreshers to keep your security focus alert and on point: Security 101 | Security 102
2. Stay up to Date:
Tech Data provides a host of up-to-date security-related topics and discussions on our Authority blog site.
3. Get Certified:
As an expert in securing and safeguarding information, Tech Data can help you become your customers’ most trusted advisor. Contact us at 800-237-8931, ext. 75002 or firstname.lastname@example.org.
4. Scale Your Security Practice
About the Author
Justin Bauford is a security solutions associate for Tech Data. His passion is technology and its pervasiveness throughout every aspect of life, giving Justin has a keen eye for detangling customer and technical issues. He’s also a part-time programmer and a serious coffee enthusiast.