September 6, 2017 By James Murphy 2 min read

Given the increasing volume of connected devices throughout society, Internet of Things (IoT) security should be a key consideration for businesses and consumers alike. Embedded in everything from our homes and cars to commercial and industrial manufacturing, IoT solutions are already providing significant benefits. As a result, IDC expects organizations to increase their IoT investments to an estimated $1.29 trillion by 2020.

Master the Basics of IoT Security

IoT connectivity increases convenience and business value, but it also introduces a larger threat surface and additional attack vectors. As a result, the IoT has unique security requirements and different considerations for security teams when responding to incidents. Companies adopting IoT solutions must master the basics to plan for these risks.

As the value of the IoT surges, it becomes increasingly important to maintain operational integrity in the face of threats. To do so, teams need to understand the specific risks they face and develop a plan to rapidly respond to IoT-related security incidents when they occur.

Bolster Your Immune System

To safely deploy and benefit from the full potential of the IoT, it is critical to put security controls and response actions in place through partnerships with reputable and experienced organizations that have trusted and reliable solutions. It is equally crucial to leverage expert security testers to perform regular and discrete IoT solution testing activities. It’s not enough to simply disconnect all devices to improve IoT security; security teams must implement an adequate incident response plan as part of an overall security immune system.

Additionally, organizations should adopt a cognitive-based IoT security platform that is secure by design. Such solutions collect connected device data and perform analytics in real time, helping security teams gain new insights and driving innovation and transformation.

Orchestrate a Response to IoT Attacks

IoT-related attacks, which often cross the line between cyber incidents and physical threats, are complex and dynamic, making them especially challenging to respond to and resolve. Security leadership can empower their teams by:

  • Developing tested and measurable incident response plans;
  • Enabling cross-organization coordination, communication and collaboration; and
  • Arming analysts with technologies that enable them to make accurate decisions and take action quickly.

An effective incident response platform helps orchestrate people and technologies across the entire response process. A proven and repeatable incident response plan gives security teams the agility, intelligence and efficiency they need to respond to all types of cyberattacks.

Discover how IBM can help your organization create a more secure IoT environment

More from Incident Response

Cybersecurity crisis communication: What to do

4 min read - Cybersecurity experts tell organizations that the question is not if they will become the target of a cyberattack but when. Often, the focus of response preparedness is on the technical aspects — how to stop the breach from continuing, recovering data and getting the business back online. While these tasks are critical, many organizations overlook a key part of response preparedness: crisis communication. Because a brand’s reputation often takes a significant hit, a cyberattack can significantly affect the company’s future…

3 recommendations for adopting generative AI for cyber defense

3 min read - In the past eighteen months, generative AI (gen AI) has gone from being the source of jaw-dropping demos to a top strategic priority in nearly every industry. A majority of CEOs report feeling under pressure to invest in gen AI. Product teams are now scrambling to build gen AI into their solutions and services. The EU and US are beginning to put new regulatory frameworks in place to manage AI risks.Amid all this commotion, hackers and other cybercriminals are hardly…

What we can learn from the best collegiate cyber defenders

3 min read - This year marked the 19th season of the National Collegiate Cyber Defense Competition (NCCDC). For those unfamiliar, CCDC is a competition that puts student teams in charge of managing IT for a fictitious company as the network is undergoing a fundamental transformation. This year the challenge involved a common scenario: a merger. Ten finalist teams were tasked with managing IT infrastructure during this migrational period and, as an added bonus, the networks were simultaneously attacked by a group of red…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today