{"id":6225,"date":"2020-05-26T18:44:39","date_gmt":"2020-05-26T17:44:39","guid":{"rendered":"https:\/\/www.n-able.com\/?p=6225"},"modified":"2021-05-06T14:26:06","modified_gmt":"2021-05-06T13:26:06","slug":"protecting-customers-iot-threats","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/de\/blog\/protecting-customers-iot-threats","title":{"rendered":"Protecting Customers from IOT Threats"},"content":{"rendered":"<p>Over the past few years, smart devices have proliferated rapidly. Traditional IT management brings some level of uniformity and predictability\u2014there are only a certain number of workstations, servers, and mobile devices a team needs to manage. But with the sheer number of devices gaining chips\u2014from watches to speakers to refrigerators\u2014teams have to adapt their security approaches.<\/p>\n<p>Today, we\u2019ll cover some challenges and solutions for protecting customers from vulnerabilities in internet of things (IoT) devices.<\/p>\n<h3>What counts as an IoT device?<\/h3>\n<p>For the purposes of this post, let\u2019s refer to anything with a chip that connects to a network as an IoT device. This includes such things as smart speakers, watches, refrigerators, doorbells, and thermostats\u2014plus many more. Odds are many workplaces have these devices in them\u2014just consider the number of people with smart watches tethered to their cell phones. But with so many workers shifting to working from home offices, the devices that could potentially compromise sensitive corporate information have increased in number.<\/p>\n<p>Attacks on these devices can bring devastating consequences. Researchers have found that, \u201c<a class=\"ext\" href=\"https:\/\/unit42.paloaltonetworks.com\/iot-threat-report-2020\/\" target=\"_blank\" rel=\"noopener noreferrer\">57% of IoT devices<\/a>\u00a0are vulnerable to medium- or high-severity attacks.\u201d Many of these attacks can be the launching point for lateral movement that leads to further compromises on networks. However, this shouldn\u2019t lead to fear\u2014there are simple steps you and your users can take to address the security threats IoT devices present.<\/p>\n<h3>Tips for IoT security<\/h3>\n<p>IoT devices rarely get the level of managed monitoring most other devices do. However, making sure these devices don\u2019t infect your customers\u2019 corporate resources often only requires a few simple steps.<\/p>\n<ul>\n<li><strong>Awareness:\u00a0<\/strong>Most users are at least somewhat aware their computers can catch viruses. Fewer think of the security flaws inherent in IoT devices (until they see a service they use end up on the news). A simple reminder to your customers and their users can go a long way. Remind them that if it contains personal data or can be used to eavesdrop on them, it needs to be secured. The goal isn\u2019t to scare people; you simply want them to be aware enough to take common-sense precautions to reduce their risk.<\/li>\n<li><strong>Passwords:<\/strong>\u00a0Password security is absolutely\u00a0<em>crucial<\/em>\u00a0for IoT devices. Make sure to set strong passwords for any devices under management and advise your customers and users to set strong passwords as well. Often, users may forget their smart thermostat has a web application that can be broken into, so remind them to think of locking down\u00a0<em>any<\/em>\u00a0devices that connect to the internet.<\/li>\n<li><strong>Multifactor authentication:<\/strong>\u00a0Most IoT devices have web portal pages, mobile apps, or both. For example, Wi-Fi enabled scales or blood pressure monitors might allow you to log in and track your biomarkers over time or even share this information with your doctor. This leaves potentially sensitive health information open to attack. Having users turn on MFA gives them an additional check in the event someone tries to break into their account.<\/li>\n<li><strong>Mobile app permissions:<\/strong>\u00a0We\u2019ve mentioned both web and mobile applications, but this warrants its own discussion. Like any other mobile application, users should be wary of giving the app too much access. A smart thermostat doesn\u2019t necessarily need to track your location, for example, or have the ability to read\/write to social media accounts. Remind users to be careful of the access they give to applications.<\/li>\n<li><strong>Segment your network:<\/strong>\u00a0The other tips rely on users pitching in and remembering to do the right thing. But you can still take steps to avoid needlessly exposing your customers\u2019 networks. If there\u2019s a device you can\u2019t manage, put it on a guest network and only allow approved devices and users onto the main network. This can help prevent an IoT device from being the entry point toward your most sensitive data on the network.<\/li>\n<li><strong>Update:<\/strong>\u00a0All devices need to remain up to date with the latest software and firmware. You can handle this yourself for any managed devices, but it\u2019s worth impressing the importance of this practice on your users as well.<\/li>\n<li><strong>Keep your other layers strong:<\/strong>\u00a0IoT devices are only one part of your ecosystem. Make sure to keep strong layers on other elements\u2014from patching to endpoint protection to email security. Additional devices do give criminals extra access points, but the fundamentals still apply.<\/li>\n<\/ul>\n<h3>Protecting the internet of things<\/h3>\n<p>IoT devices are nothing new. Each device can have its own intricacies and levels of security. However, despite the added complexity you can still protect the wider network and company data with a few simple steps.<\/p>\n<p>&nbsp;<\/p>\n<p><b>We mentioned the importance of password security in this article. As the number of devices and application grows, maintaining strong passwords can quickly become hard to manage. SolarWinds<sup>\u00ae<\/sup>\u00a0Passportal is built to help you enforce password best practices across your own team. It can help your team automatically generate strong passwords, gain one-click access to accounts, and can even let you quickly grant or revoke access as needed. Learn more by visiting\u00a0<\/b><a class=\"ext\" href=\"https:\/\/www.passportalmsp.com\/ocular?promo=blog\" target=\"_blank\" rel=\"noopener noreferrer\"><b>passportalmsp.com<\/b><\/a><b>.<\/b><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Over the past few years, smart devices have proliferated rapidly. Traditional IT management brings some level of uniformity and predictability\u2014there are only a certain number of workstations, servers, and mobile&#8230;<\/p>\n","protected":false},"author":43,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-6225","post","type-post","status-publish","format-standard","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Protecting Customers from IOT Threats - N-able<\/title>\n<meta name=\"description\" content=\"Traditional IT management brings some level of uniformity and predictability\u2014there are only a certain number of workstations, servers, and mobile.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/de\/blog\/protecting-customers-iot-threats\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protecting Customers from IOT Threats - N-able\" \/>\n<meta property=\"og:description\" content=\"Traditional IT management brings some level of uniformity and predictability\u2014there are only a certain number of workstations, servers, and mobile.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/de\/blog\/protecting-customers-iot-threats\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-26T17:44:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-05-06T13:26:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Tim Brown\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tim Brown\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"4\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/protecting-customers-iot-threats#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/protecting-customers-iot-threats\"},\"author\":{\"name\":\"Tim Brown\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/65b11c76d7eceabc6a98f67feafee6e8\"},\"headline\":\"Protecting Customers from IOT Threats\",\"datePublished\":\"2020-05-26T18:44:39+01:00\",\"dateModified\":\"2021-05-06T13:26:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/protecting-customers-iot-threats\"},\"wordCount\":848,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"articleSection\":[\"Internet of things\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/protecting-customers-iot-threats\",\"url\":\"https:\/\/www.n-able.com\/de\/blog\/protecting-customers-iot-threats\",\"name\":\"Protecting Customers from IOT Threats - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de#website\"},\"datePublished\":\"2020-05-26T18:44:39+01:00\",\"dateModified\":\"2021-05-06T13:26:06+00:00\",\"description\":\"Traditional IT management brings some level of uniformity and predictability\u2014there are only a certain number of workstations, servers, and mobile.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/protecting-customers-iot-threats#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/de\/blog\/protecting-customers-iot-threats\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/protecting-customers-iot-threats#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Internet of things\",\"item\":\"https:\/\/www.n-able.com\/de\/blog\/category\/internet-of-things\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protecting Customers from IOT Threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/de#website\",\"url\":\"https:\/\/www.n-able.com\/de\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/de?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/de#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/de\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/65b11c76d7eceabc6a98f67feafee6e8\",\"name\":\"Tim Brown\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/12fd73820610a5263c4429c2a99094e0c2e82401bbe39bf42457e891670b6566?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/12fd73820610a5263c4429c2a99094e0c2e82401bbe39bf42457e891670b6566?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/12fd73820610a5263c4429c2a99094e0c2e82401bbe39bf42457e891670b6566?s=96&d=mm&r=g\",\"caption\":\"Tim Brown\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Protecting Customers from IOT Threats - N-able","description":"Traditional IT management brings some level of uniformity and predictability\u2014there are only a certain number of workstations, servers, and mobile.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/de\/blog\/protecting-customers-iot-threats","og_locale":"de_DE","og_type":"article","og_title":"Protecting Customers from IOT Threats - N-able","og_description":"Traditional IT management brings some level of uniformity and predictability\u2014there are only a certain number of workstations, servers, and mobile.","og_url":"https:\/\/www.n-able.com\/de\/blog\/protecting-customers-iot-threats","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2020-05-26T17:44:39+00:00","article_modified_time":"2021-05-06T13:26:06+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"Tim Brown","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Verfasst von":"Tim Brown","Gesch\u00e4tzte Lesezeit":"4\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/de\/blog\/protecting-customers-iot-threats#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/de\/blog\/protecting-customers-iot-threats"},"author":{"name":"Tim Brown","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/65b11c76d7eceabc6a98f67feafee6e8"},"headline":"Protecting Customers from IOT Threats","datePublished":"2020-05-26T18:44:39+01:00","dateModified":"2021-05-06T13:26:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/de\/blog\/protecting-customers-iot-threats"},"wordCount":848,"publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"articleSection":["Internet of things"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/de\/blog\/protecting-customers-iot-threats","url":"https:\/\/www.n-able.com\/de\/blog\/protecting-customers-iot-threats","name":"Protecting Customers from IOT Threats - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/de#website"},"datePublished":"2020-05-26T18:44:39+01:00","dateModified":"2021-05-06T13:26:06+00:00","description":"Traditional IT management brings some level of uniformity and predictability\u2014there are only a certain number of workstations, servers, and mobile.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/de\/blog\/protecting-customers-iot-threats#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/de\/blog\/protecting-customers-iot-threats"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/de\/blog\/protecting-customers-iot-threats#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Internet of things","item":"https:\/\/www.n-able.com\/de\/blog\/category\/internet-of-things"},{"@type":"ListItem","position":2,"name":"Protecting Customers from IOT Threats"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/de#website","url":"https:\/\/www.n-able.com\/de","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/de?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/de#organization","name":"N-able","url":"https:\/\/www.n-able.com\/de","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/65b11c76d7eceabc6a98f67feafee6e8","name":"Tim Brown","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/12fd73820610a5263c4429c2a99094e0c2e82401bbe39bf42457e891670b6566?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/12fd73820610a5263c4429c2a99094e0c2e82401bbe39bf42457e891670b6566?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/12fd73820610a5263c4429c2a99094e0c2e82401bbe39bf42457e891670b6566?s=96&d=mm&r=g","caption":"Tim Brown"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/6225","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/users\/43"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/comments?post=6225"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/6225\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/media?parent=6225"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}