Page 25 - Cyber Warnings
P. 25
Common historical patterns seem to indicate that it will take another event larger than
Mirai before the IoT field gets strapped with regulations binding vendors as primarily
accountable for validating that their devices are at a minimum sold with secure default
configurations. In the meantime, general best practices for securing internet enabled
devices stand true for any smart IoT system.
Update firmware regularly, change default passwords, turn off unnecessary services
(Telnet, UPnP, etc), segment the network they land on, and ask yourself, “Does my
toaster really need to tweet?”
Conclusion
Technological advances are happening at a furious pace. While we are still figuring out what
works best from a best practice perspective, we are being challenged to rethink the way to do
things on the spot. Security is no longer just a backroom conversation.
As Security Professionals our value to the corporations we serve and the communities that we
participate in is readily apparent. As a human collective, we have created amazing things.
Powerful tools that will shape the future of things to come.
Every year we get a little better at what we do, learn from our mistakes, improve our prototypes
and continue to build upon a pretty solid foundation of knowledge. Even as we course correct
from challenging experiences in 2016, we come out stronger because of them.
Looking forward to 2017, I have much hope for the world of infosec and the work we have cut
out for us. Tweeting toasters aside, it's going to be a good year.
About the Author
Corey Wilburn is the security practice manager at DataEndure where he
specializes in the design of strategic solutions, aimed at delivering high-value
operational intelligence, leveraging best-in-class products as well as services
built around current and emerging standards. He has a passion for infosec
policies, processes and procedures.
He loves working with clients to help them realize the potential for their security strategy,
maximizing ROI while reducing their attack surface, and helping them become more resilient in
the face of an ever-evolving threat landscape.
25 Cyber Warnings E-Magazine February 2017 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide