Страницы

Tuesday, October 13, 2020

Cybersecurity

 

How to Pinpoint Rogue IoT Devices on Your Network


Researchers explain how security practitioners can recognize when a seemingly benign device could be malicious.

A Raspberry Pi floating on your network may not be cause for concern – at first. But when did it join the network? What is it doing? Is it the only Raspberry Pi? These questions can help discern a benign connected device from a malicious product trying to infiltrate an organization. 

"The amount of unmanaged devices has pretty much exploded in the last five years," said David Pearson, head of threat research at Awake Security, in a talk at last week's Interop Digital. More people are connecting to corporate networks with devices that aren't managed to the level you might expect corporate infrastructure and devices to be managed.

This is a growing problem, in large part because most Internet of Things (IoT) device traffic is unencrypted, he explained.

"There's so much information that gets shared, whether that's internal to internal, or internal to external, that's just completely in the clear," Pearson said.

Now, as people are bringing business data onto home networks, ensuring data security is even more important.

About a year ago, Pearson and the Awake Security team hypothesized they would be able to analyze the behavior of a device and, in doing so, distinguish IoT and operational technology (OT) devices from mobile devices, bring-your-own-device (BYOD) systems, corporate infrastructure, and enterprise devices. They not only learned this was possible but discovered myriad ways these connected devices put businesses at risk. 

No comments:

Post a Comment