A Health System's leap to IOT
Industrial Scientific Blazes a Trail in IoT
IoT Platforms: What are They and Do You Need One?
IoT Facilitates Enhancements to Water Management Systems
Transforming the Future City
Brenna Berman, CIO, City of Chicago
The Time Is Now To Join Forces For IoT
Sam Lamonica, VP And CIO, Rosendin Electric
How Internet of Things (IoT) will Rewire Supply Chains
Chad Lindbloom, CIO, C.H. Robinson
Embracing the Internet of Things
John Sprague, Deputy Associate CIO for Technology and Innovation, NASA
Thank you for Subscribing to CIO Applications Weekly Brief
Ways to reduce IoT risks
It is vital to know about the threats that cause damage to an education network and take the required measures to prevent them.
FREMONT, CA: Education centers are easily prone to cyber threats with the increased use of mobile phones, and the IoT technology further risks the overall network. Upon evaluation of the dangers and their systems, followed by applying strategies and the right tools the organizations can help protect the sensitive data of students and staff.
Know the IoT Education Landscape
Most schools today employ digital-based curriculums, where the students are required to access their mobiles and connected devices based on a 1:1 program or bring your own device (BYOD). Further, the utilization of the tools also creates problems surrounding the bandwidth and conformity from regulations such as COPPA, FERPA, and CIPA. Along with the supporting devices enabled by educational software, schools also need to secure IoT like smart boards and other HVAC(Heating, ventilation, and air conditioning) technology.
Know Top Threats
• Mobile Malware: There is a significant rise in malware, especially those targeting mobile devices.
• IoT Exploits: Malware exploiters for some time were too focused on exploiting IoT devices. The malware was targeted to devices such as routers, printers, and IP cameras and others.
• Cryptojacking: Cryptojacking refers to a form of malware where cybercriminals use someone else’s tools to mine for cryptocurrency. Cryptojacking harms the performance along with making the security measures weak. New crypto-jacking malware acts as a variant to keenly hinder the network security measures like antivirus.
• IoT Botnets: Recently, malware has also been seen enhancing codebases like Reaper and Mirai to target IoT devices along with multiple exploits. Furthermore, a lot of IoT botnets are more flexible and spread quickly.
Protection against the IoT attacks
The IT department should make use of threat intelligence to be alert of the attack types and entryways used to target networks. Next, the schools should learn and segment the devices which would gain them visibility into each machine. To protect mobile malware, IT teams are to introduce phone application security tools or build secure perimeters.
Check This Out: Top Industrial IoT Solution Companies