Security News > 2021 > April > The parallels of pandemic response and IoT security
We need to understand every packet, bit, flow, application, interaction on the network as well as device and user interactions.
Through vigilant monitoring and baselining of behavior, we can better understand at-risk devices and behavior and act quickly to limit or prevent infection.
Because complete isolation is not practical for most networks, network segments, and devices, perimeter controls are needed to limit who and what can get inside the network.
In a network environment, super spreaders may be devices that don't get proper attention because it is easy to forget they are connected.
While the recent breach of Verkada cameras was a result of admin passwords exposed on the Internet, video surveillance cameras are another example of a potential super spreader device as they typically come with weak default passwords.
For the sophisticated, network-connected medical devices that are the backbone of modern medicine, that means discovering and profiling each device in the network, conducting segmenting based on risk level and function, and then monitoring for suspicious behavior and other indicators of compromise.
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/Ukb_DrGNQ_s/