perle-logoPerle LogoPerle Logo
  • Global - English

    • Deutsch

    • Français

    • Italiano

    • Español

    • 日本語

    • 中國

  • Contact Us
  • PRODUCTS
      • Serial to Ethernet
        Connect serial based equipment across an Ethernet LAN:
      • Serial Terminal Servers
        Connect Serial RS232 ports over Ethernet
      • Serial Console Servers
        Connect to Cisco and Data Center Equipment
      • Serial Device Servers
        Network enable RS422 and RS485 Devices
      • Ethernet I/O
        Access & Control remote Digital IO, Analog IO, relays & sensors
      • Serial Extenders
        Extend Serial data transmissions over long distance
      • Serial to Fiber
        Extend RS232, RS422 and RS485 over optical fiber
      • Serial SHDSL Extender
        Transmit serial data up to 20 km across copper wire
      • RS232 Serial Isolator
        Electrical isolation of RS-232 (V.24) interfaces
      • Serial Interface Converter
        Convert RS232 to RS422 or RS485
      • RS485 Repeater
        Amplify RS485 signals up to 1.2km
      • Media Converters
        Extend network distances over fiber up to 160km
      • Copper to Fiber
        Extend 10/100/1000/10G copper-based Ethernet equipment over fiber
      • Fiber to Fiber
        Connect multimode to multimode or multimode to single mode
      • Specialized Converters
      • Modular Chassis System
      • Stand-alone Media Converters
      • Managed Media Converters
      • SFP Media Converters
      • PoE Media Converters
      • Industrial Converters
      • DIN Rail Mounted Converters
      • SFP to SFP Protocol Transparent
      • SFP, SFP+ and XFP Optical Transceivers
      • SFP Optical Transceivers
      • SFP+ and XFP Optical Modules
      • PerleVIEW Device Management Software
        Centralized management for Perle Media Converters, Ethernet Extenders and Industrial Switches
      • LTE Routers
        Enterprise-Class Edge Cellular Routers & Gateways
      • Ethernet Extenders
        Transparently extend 10/100/1000 Ethernet connections across copper wiring
      • Ethernet Repeater
      • 10/100 Copper Extenders
      • 10/100/1000 Copper Extenders
      • Modular Chassis System
      • Stand-alone Copper Extenders
      • Managed Ethernet Extenders
      • Industrial Ethernet Extenders
      • PoE Ethernet Extenders
      • SHDSL Ethernet Extender
      • Remote Power Switches
        Remotely power on/off/cycle Data Center equipment
      • PCI Cards
      • Serial Cards
        Add RS232, RS422, RS485 serial ports to your PC or server
      • Parallel Cards
        Add IEEE 1284 parallel ports standard to your PC or servers
      • Industrial Switches
        Compact Industrial-grade Ethernet Switches designed for harsh temperature, vibration and shock environments
      • Managed Industrial Switches
      • Unmanaged Industrial Switches
      • PoE Switches
      • DIN Rail Power Supplies
        5, 12, 15, 24, or 48 V DC Industrial-grade reliability
      • Filter & Search Power Supplies
      • DIN Rail Patch Panels
        Ethernet patch panels simplify connecting field cabling to control cabinet cabling.
      • PoE & PoE+ Injectors
        Integrate PoE devices into a non-PoE network
      • Surge Protectors
        Effective lightening, RFI and transient surge protection
      • CAT5/6/7 Surge Protector
        Protect wired, wireless and PoE equipment at speeds up to 10Gbps
      • SHDSL Surge Protector
        Protect DSL telecommunication interfaces
  • APPLICATIONS
      • Industry User Stories
      • Telecommunications
      • Healthcare and Medical
      • Government / Military
      • Data Center Management
      • Electric Utilities
      • Renewable Energy
      • Oil & Gas
      • Industrial Automation
      • Marine
      • Finance
      • Education
      • Retail / Point of Sale (POS)
      • Transportation
      • Sports & Entertainment
      • Broadcasting
      • Resources
      • Online Product Demos
      • About Serial to Ethernet
      • Serial to Ethernet Terminology
      • About Ethernet over Fiber
      • About Fiber to Fiber Conversion
      • Documents
      • Technical Notes
      • Application Notes
      • Case Studies
      • White Papers
  • HOW TO BUY
      • Online Stores
      • USA Store
      • Canada Store
      • UK Store
      • European Store
      • Contact Perle
      • Contact Perle Sales
      • Get a Quote
      • Product Questions
      • Distributors
      • USA Distributors
      • Worldwide Distributors
  • SUPPORT
      • Maintenance
      • Maintenance Options
        • America
        • EMEA
      • Maintenance Registration
      • Maintenance Inquiries
      • Warranty
      • Perle Product Warranties
      • Country Warranties
      • Warranty Registration
      • RMA Request
      • Technical Support
      • Request Support
      • Downloads
      • Knowledgebase
      • Cabling
      • Declarations of Conformity
  • ABOUT PERLE
      • Partners
      • Alliances
      • OEM Program
      • Enviromental Policy
      • REACH, RoHS & WEEE
      • Conflict Minerals
      • ISO 9001 & EMS 14001
      • Privacy & Cookie Policy
      • News & Events
      • Press Releases
      • Industry News
      • Media Contacts
      • About Us
      • Company
      • Contact Us
      • Careers
      • Certifications
      • Worldwide Offices
  1. Industry News
  2. IoT security: 5 common enterprise networking mistakes
  3. Print Friendly Version of this pagePrint Get a PDF version of this webpagePDF

8/26/2019

IoT security: 5 common enterprise networking mistakes

Max Burkhalter

IoT security: 5 common enterprise networking mistakes

Internet of things technologies have made their way into nearly every commercial, industrial and public sector application imaginable. The fast pace of IoT innovation, however, has left many IT administrators unprepared for the associated security risks, resulting in a number of high-profile breaches that have reshaped the future of smart device deployment.

For one, the lack of standardized cybersecurity practices in the IoT industry has introduced a number of vulnerabilities that have been difficult to mitigate. Take, for example, the recent resurgence of Bashlite malware. According to a report from Trend Micro, this particular strain of malware was most prevalent in 2014, but has since been modified for use in large-scale distributed-denial-of-service attacks. By adding consumer and enterprise devices into a massive botnet, cybercriminals are able to disrupt their targets' internal operations and bring customer-facing resources completely offline.

Currently, these types of security incidents illustrate the limitations of IoT technology as a whole, yet few companies plan to slow down their implementation goals. Market research from Zebra Technologies found that nearly half of enterprises across the world are "aggressively pursuing IoT investments with the goal of digitally transforming their business models." But to stay ahead of mounting cybersecurity concerns, business and IT leaders must recognize the common pitfalls of deploying and managing IoT devices.

Different IoT devices connect to a centralized enterprise network. Every endpoint on an enterprise network represents a possible attack vector for would-be hackers.

Top 5 IoT networking mistakes
According to a 2018 report from Symantec, IoT devices experienced a 600% increase in cyberattacks compared to the previous year. While hardware and software flaws have certainly contributed to the growing number of enterprise security incidents, the impact of human error should not be neglected. In a recent Network World article, Robert Burnett, director of B2B products and solutions at the IT supplier Brother International, shared the top 5 networking mistakes that leave companies open to malicious activity:

1. Lack of access controls: Limiting users' access to IoT devices is crucially important to the overall security of enterprise networks, yet many IT administrations have struggled to put robust authentication systems in place. Companies that do not have complete control over who can access their smart devices, and for what purposes, are often more exposed to internal and external security threats.

2. Failing to update device firmware: When it comes to insulating corporate networks from malware, ransomware and other digital threats, proactive patch management is essential. Cybercriminals are constantly on the lookout for unpatched devices to infiltrate, as a single vulnerable endpoint can grant them access to key administrative processes. Considering most IoT devices are littered with zero-day exploits, it's no surprise that companies have struggled to stay on top of their update requirements.

3. Poor endpoint visibility: Without a unified cybersecurity platform in place, network administrators must rely on a range of siloed IT solutions to secure their business-critical assets. This can prevent enterprises from keeping a close watch on how their IoT devices are used and may impact their ability to respond to security breaches. Environments that rely on a variety of different IoT technologies are at the greatest risk, as older devices rarely have the real-time monitoring capabilities that companies rely on.

4. Inadequate end-user awareness: As mentioned previously, human error can introduce a variety of security flaws into an enterprise's overall IT posture. Phishing scams, in particular, have proven quite effective for stealing users' login credentials and gaining access to sensitive information. Companies that do not train their employees on cybersecurity best practices open themselves up to a range of financial, reputational and compliance issues. 

5. Using default credentials: Managing usernames and passwords has always been a bit of a pain point for large companies, but the widespread integration of IoT technologies has only compounded the issue. Nearly all IoT devices come with default login credentials that should be updated pre-deployment, yet many IT professionals overlook this crucial step in the process, according to Sophos. What's worse, most IoT device credentials are available online and can be easily located through the Shodan search engine.

Keeping up with modern cyberthreats can feel like an impossible task, as new strains of malware, social engineering tactics and cryptomining software are released on an almost weekly basis. Luckily, Perle offers powerful connectivity tools that can help organizations maximize their IoT security and storage applications and maintain performance during new deployments. Read some of our customer stories to find out how we've empowered other forward-thinking companies to take full advantage of their IoT systems.

Related Articles
  • Recent data leak highlights the importance of IoT back-end security
  • How agricultural experts are using IoT to save bee colonies
  • Nokia and the potential of sensing as a service
Related Products
  • Parallel Cards
Back to top

Products

Applications

About Perle

Contact Us

How to Buy

Technical Support

Site Map

Legal Information

Privacy & Cookie Policy

Products by Perle

specialix Chase Research

Follow Perle

Copyright © 1996 - 2019 Perle. All Rights Reserved

Contact Us
Products
Applications
How to Buy
Support
About Perle
Privacy & Cookie Policy
Follow Perle

Copyright © 1996 - 2019 Perle. All Rights Reserved