Are Your IoT Devices Under Attack? Probably, and Here’s How to Protect Them

ROSE DE FREMERY | January 29, 2019

article image
If you have Internet of Things (IoT) devices in your environment, you might want to look at what’s going on under the hood. IoT attacks increased 600 percent between 2016 and 2017, and they show no signs of slowing down. As that trend has accelerated, we’ve already seen several well-documented cases in which masses of IoT devices have been marshaled into devastating botnets like Mirai. Because connected gadgets are entering the business sphere in greater numbers, taking a close look at the vulnerabilities they may harbor is essential.

Spotlight

Kezber

In business for over 20 years, we are enterprise IT experts. Our purpose is to contribute to the growth of our clients by providing the technical and application development services they need to make their business successful.

OTHER ARTICLES

Graph machine learning in distributed systems: What you need to know

Article | March 16, 2020

Just as graphs make it easier for us to understand and act on complex data, graph machine learning can take graph theory a giant step further. But can it even help today’s service providers to improve reliability and predict anomalous behaviors in complicated distributed systems? Find out below…How much do you know about graph representation of data? Over the last two decades, graph theory has become increasingly popular in both research and industry. Among other areas, it has been used in epidemiology, medicine genetics, healthcare, banking and engineering to solve challenges such as routing, finding relation, path etc.

Read More

The world is ready for 5G. Are you?

Article | March 16, 2020

At last, the wait for 5G is nearly over. As this map shows, coverage is widespread across much of the U.S., in 24 EU countries, and in pockets around the globe. The new wireless standard is worth the wait. Compared to 4G, the new wireless standard can move more data from the edge, with less latency. And connect many more users and devices—an important development given that the IDC estimates 152,000 new Internet of Things (IoT) devices per minute by 2025. Put it together, and 5G is a game-changing backhaul for public networks. (Wi-Fi 6, often mentioned in the same breath as 5G, is generally used for private WANs.

Read More

How to Scale IT Infrastructure

Article | March 16, 2020

IT infrastructure scaling is when the size and power of an IT system are scaled to accommodate changes in storage and workflow demands. Infrastructure scaling can be horizontal or vertical. Vertical scaling, or scaling up, adds more processing power and memory to a system, giving it an immediate boost. Horizontal scaling, or scaling out, adds more servers to the cloud, easing the bottleneck in the long run, but also adding more complexity to the system.

Read More

New Ransomware Targets Critical Infrastructure in 2020

Article | March 16, 2020

Critical infrastructure, like power and water systems, face a number of cyber-security threats. Traditional ransomware variants can bring these systems down by encrypting files that are vital to their operation. However, a new variant poses an even greater risk to critical infrastructure. The Ekans ransomware is designed specifically to take down critical services, making anti-ransomware protection even more important in these environments. Ransomware is a well-known threat made famous by the WannaCry worm. The success of the 2017 WannaCry outbreak has inspired a rash of attacks and new ransomware variants in recent years.

Read More

Spotlight

Kezber

In business for over 20 years, we are enterprise IT experts. Our purpose is to contribute to the growth of our clients by providing the technical and application development services they need to make their business successful.

Events