Getting alerts is only as good as the response to them. Without a response, they are just acting as a smoke screen for the penetrators. Those alerts should be converted into automatic actions of blocking, limiting access or quarantine of suspected devices. For blocking mechanism, the closer you do the blocking to the actual network infrastructure, like shutting down the actual Ethernet port, the more secure and affective you are.
How to approach keeping your IoT devices safe
-
by IoTNews
- Categories: Uncategorized
- Tags: How to approach keeping your IoT devices safe
Related Content
How to prep for becoming an IoT leader
By
IoTNews
June 18, 2021
IoT, edge computing, and AI pay off for asset-based enterprises
By
IoTNews
June 18, 2021
TCP/IP stack vulnerabilities threaten IoT devices
By
IoTNews
June 18, 2021
Cisco bolts together enterprise and industrial edge with new routers
By
IoTNews
June 18, 2021
The RFID story
By
IoTNews
May 19, 2021