On January 25, 2021, President Biden signed an executive order requiring the federal government to purchase more goods made in the United States. The order…
Securing IoT Part IV: Humans
Human error is the greatest security risk to IoT, often due to oversight or a lack of knowledge. The shift to remote working due to…
Endpoint Security Platforms: EPP and EDR
An endpoint is any computing device attached to an Internet-connected network, like computers, mobile devices, printers, routers or sensors. Over 70% of IT security breaches…
Securing IoT Part III: The Cloud
While cloud service providers are responsible for infrastructure security, it is the responsibility of individual companies to ensure data protection for stored information. McAfee outlines…
Securing IoT Part II: Security by Design for Devices
Security by design for IoT devices means envisioning security vulnerabilities at the concept stage of IoT device manufacturing. This allows for the strategic implementation of…
Securing IoT Part I: The Network
Threats to the IoT network are everywhere. To prevent attacks, common IoT security practices, networks and access points must be carefully and regularly evaluated. Why…
Securing the IoT Supply Chain
In November 2020, the European Union Agency for Cybersecurity released guidelines on securing the IoT supply chain. This can be a difficult task as all…
The Zero Trust Approach to Cybersecurity
Cybersecurity threats are everywhere and new government information standards are being implemented to keep data secure. As cybersecurity practices receive updates, companies should reevaluate their…
IoT Security Weaknesses: Networks, Development & Users
There are many threats to IoT security. But among the ugly attacks, there’s good news. How do Hackers Access IoT? Hackers target IoT with malicious…