Skip to content
Safety & Security Ecosystem
Critical communications
We make devices and networks that perform exceptionally in the harshest conditions, so you can stay connected and communicate clearly.
Command center
We unify voice, video and data feeds into the command center, providing perspective to help make decisions with focus, accuracy and speed.
Video security
We design video security systems powered by responsibly-built AI analytics, so you can understand risks and act with certainty.
Managed & support services
We provide managed and support services for keeping your technology secure and up-to-date, so you can be confident in performance.
Customer success stories
Discover how customers are tapping into our technology ecosystem to stay safer.
Government grants
Explore the different grant assistance programs to help you during the grant application process.

Increasing Connectivity Exposes New Cyber Attack Vectors

Can your cell phone be used to steal your email password or fingerprint data? Can hackers access personal information from your heart rate monitor, fitness tracker or smartwatch? What may have once sounded like science fiction is rapidly becoming reality.

We now live in an era of connectivity – with digitally connected devices permeating every aspect of our lives. In fact, as soon as 2020, the number of connected devices will reach more than 21 billion. This level of interconnectedness is enabling people and businesses to do things never before imagined – from home automation to environmental monitoring.

Today’s increasingly connected world is also introducing more attack vectors and more possibilities for cyber crime. Unfortunately, some of the most commonly used interconnected devices contain vulnerabilities. At a recent DEF CON, 47 vulnerabilities affecting 23 connected items – including webcams, door locks, thermostats and baby monitors – were disclosed. With these vulnerabilities, cyber criminals now have more entry points and can move laterally across networks. As a result, cyber attacks can have far more extensive effects than ever before. Despite this information, 80 percent of organizations do not routinely test their IoT apps for security vulnerabilities.

Developing resilience to withstand cyber attacks is critical to future success. Safeguarding software and connected devices – and making it as difficult as possible for exploitation – will help to improve overall organization system security.

Organizations must be proactive and operate in a state of readiness. Embracing a holistic, risk-based strategy enables organizations to manage their risk awareness, security, detection, response and recovery. By focusing on mitigation options, continuous monitoring, diagnosis and remediation, companies are better able to protect themselves and proactively confront potential situations before they become an acute threat.

Read the full Motorola Solutions White Paper here to learn more about the emergence of new attack vectors and how a holistic strategy can help defend against emerging cyber threats.

avatar
Troy Mattern
Troy Mattern is the Vice President for Product and Services Cybersecurity at Motorola Solutions. Troy joined Motorola Solutions in June of 2017 and leads all policy, strategy and prioritization for cybersecurity efforts pertaining to Motorola Solutions Products and Services.
COMMENTS

Related articles