Security’s Greatest Enemy: Endpoints Disguised as ‘Stuff’

September 5, 2018 Mayuri Kumar

When considering the security of the devices that make up the internet of things (IoT), all endpoints must be considered in the risk equation. For years the standard model for non-traditional IT assets—such as printers, IoT, ICS, and anything connected to the network that is not directly managed by IT—is to be ignored by the IT and security functions. If this trend doesn’t change soon, everyone will be able to access whatever data they want with impunity, and any semblance of security and privacy will go out the window.

Click here to read John Nye's full article. 

Previous Article
IoT Security: How to Effectively Manage Endpoint Device Security
IoT Security: How to Effectively Manage Endpoint Device Security

IoT security is one of the most concerning and critical issues that we in healthcare face on a daily basis....

Next Video
Assessing Medical Device and IoT Security  4 Questions You Should Ask Yourself
Assessing Medical Device and IoT Security 4 Questions You Should Ask Yourself

The number of devices connected to a single hospital network is overwhelming. For example, a typical hospit...