Page 68 - Cyber Defense eMagazine - September 2017
P. 68

have taken a stab at security by employing trusted boot capabilities, encrypting network traffic or
               using  Secure  Shell  (SSH).  But  if  they  and  the  organizations  that  buy  them  don’t  implement
               these protections in the right way, such efforts can be ineffective.

               IoT Security Best Practices
               So, how do we go about securing our infrastructure and data in the new digital age? Securing
               IoT starts before the pieces are even put in place. It begins during the equipment and software
               selection process. When feasible, it’s important to select equipment and software with built-in
               security protections.

               Organizations should also take measures to ensure that their systems are secure by regularly
               changing the default usernames and passwords on their IoT devices. Updating IoT devices with
               the latest operating systems and patches also helps ensure the security of the network. There’s
               no  one-size-fits-all  approach  to IoT  network  security,  of  course,  but  data  encryption,  network
               authentication and secure private networks all help provide additional protection to vulnerable
               systems.

               Because  IoT  has  implications  for  both  the  information  technology  (IT)  and  operational
               technology (OT) parts of an organization, staff members from both the IT and OT teams should
               work  together  to  decide  what  IoT  security  posture  is  right  for  their  organization.  IT  and  OT
               engineers  should  collaborate  in  setting  up  security  policies  and  procedures to  implement  IoT
               security for their applications, devices and networks.

               IoT Talent Requirements and Gaps
               Collaboration between IT and OT team members with existing skillsets will only get us so far,
               though.  That’s  because  creating,  securing  and  supporting  IoT  implementations  requires  new
               skillsets. Both IT and OT need digital expertise. So, training staff members to address IoT is
               essential for organizations as they stage their digital transformations.



               The converged architecture involved in IP-connected factories, for example, introduces a talent
               gap not met by current IT or OT professionals. As a result, individuals from each discipline need
               to learn the technology from the other. Additionally, soft skills in areas such as communication,
               collaboration and project management enable teams to work together in a more productive and
               integrated way.




               For IT engineers, learning about industrial networking and application protocols advances their
               skillsets in the digital era. Gaining knowledge about wireless deployment is also essential for
               such  industrial  verticals  as  mining,  transportation  and  utilities.  Understanding  IoT  security
               technologies and being able to implement the most relevant ones for a particular organization
               gives IT professionals a strategic advantage.




                    68   Cyber Defense eMagazine – September 2017 Edition
                         Copyright © Cyber Defense Magazine,  All rights reserved worldwide.
   63   64   65   66   67   68   69   70   71   72   73