TranslateProject/sources/talk/20190825 Top 5 IoT networking security mistakes.md
DarkSun 6703a5fca3 选题: 20190825 Top 5 IoT networking security mistakes
sources/talk/20190825 Top 5 IoT networking security mistakes.md
2019-08-27 00:56:56 +08:00

5.5 KiB
Raw Blame History

Top 5 IoT networking security mistakes

IT supplier Brother International shares five of the most common internet-of-things security errors it sees among buyers of its printers and multi-function devices. Getty Images

Even though Brother International is a supplier of many  IT products, from machine tools to head-mounted displays to industrial sewing machines, its best known for printers. And in todays world, those printers are no longer stand-alone devices, but components of the internet of things.

Thats why I was interested in this list from Robert Burnett, Brothers director, B2B product & solution basically, the companys point man for large customer implementations. Not surprisingly, Burnett focuses on IoT security mistakes related to printers and also shares Brothers recommendations for dealing with the top five.

#5: Not controlling access and authorization

“In the past,” Burnett says, “cost control was the driving force behind managing who can use a machine and when their jobs are released.” Thats still important, of course, but Burnett says security is quickly becoming the key reason to put management controls on print and scan devices. Thats true not just for large enterprises, he notes, but for businesses of all sizes.

INSIDER: 5 ways to prepare for Internet of Things security threats

#4: Failure to update firmware regularly

Lets face it, most IT professionals stay plenty busy keeping servers and other network infrastructure devices up to date and ensuring their infrastructure is as secure and efficient as possible. “In this day-to-day process,” Burnett says, “devices like printers are very often overlooked.” But out-of-date firmware could expose the infrastructure to new threats.

#3: Inadequate device awareness

Its critical, Burnett says, to properly understand who is using what, and the capabilities of all the connected devices in the fleet. Reviewing these devices using port scanning, protocol analysis and other detection techniques should be part of the overall security reviews of your network infrastructure. Too often, he warns, “the approach to print devices is if its not broke, dont fix it!’” But even devices that have been running reliably for years should be part of security reviews. Thats because older devices may not have the capability to offer stronger security settings or you may need to update their configuration to meet todays greater security demands. This includes the monitoring/reporting capabilities of a device.

#2: Inadequate user training

“Training your team on best practices for managing documents within the workflow must be part of a strong security plan,” Burnett says. The fact is, no matter how hard you work to secure IoT devices, “the human factor is often the weakest link in securing important and sensitive information within a business. Items as simple as leaving important documents on the printer for anyone to see, or scanning documents to the wrong destination by accident, can have a huge, negative impact on a business not just financially, but also to its IP, reputation, and cause compliance/regulation issues.”

#1: Using default passwords**

**

“Just because its easy doesnt mean its not important!” Burnett says. Securing printer and multi-function devices from unauthorized admin access not only helps protect sensitive machine-configuration settings and report information, Burnett says, but also prevents access to personal information, such as user names that could be used in phishing attacks, for example.

[ Prepare to become a Certified Information Security Systems Professional with this comprehensive online course from PluralSight. Now offering a 10-day free trial! ]

Join the Network World communities on Facebook and LinkedIn to comment on topics that are top of mind.


via: https://www.networkworld.com/article/3433476/top-5-iot-networking-security-mistakes.html

作者:Fredric Paul 选题:lujun9972 译者:译者ID 校对:校对者ID

本文由 LCTT 原创编译,Linux中国 荣誉推出