Your session has expired.

Your authenticated session has expired due to inactivity. You can close this message and continue as a guest or log in again before proceeding.

Your reply has been posted successfully!

Entries » Blog » Increasing Connectivity Exposes New Cyber Attack Vectors Author: Troy Mattern

Increasing Connectivity Exposes New Cyber Attack Vectors Author: Troy Mattern

Created Oct 19 2018, 1:55 PM by Paul Jeffs

Can your cell phone be used to steal your email password or fingerprint data? Can hackers access personal information from your heart rate monitor, fitness tracker or smartwatch? What may have once sounded like science fiction is rapidly becoming reality.

We now live in an era of connectivity – with digitally connected devices permeating every aspect of our lives. In fact, as soon as 2020, the number of connected devices will reach more than 21 billion. This level of interconnectedness is enabling people and businesses to do things never before imagined – from home automation to environmental monitoring. 

Today’s increasingly connected world is also introducing more attack vectors and more possibilities for cyber crime. Unfortunately, some of the most commonly used interconnected devices contain vulnerabilities. At a recent DEF CON, 47 vulnerabilities affecting 23 connected items – including webcams, door locks, thermostats and baby monitors – were disclosed. With these vulnerabilities, cyber criminals now have more entry points and can move laterally across networks. As a result, cyber attacks can have far more extensive effects than ever before. Despite this information, 80 percent of organisations do not routinely test their IoT apps for security vulnerabilities.

Developing resilience to withstand cyber attacks is critical to future success. Safeguarding software and connected devices – and making it as difficult as possible for exploitation – will help to improve overall organisation system security.

Organisations must be proactive and operate in a state of readiness. Embracing a holistic, risk-based strategy enables organisations to manage their risk awareness, security, detection, response and recovery. By focusing on mitigation options, continuous monitoring, diagnosis and remediation, companies are better able to protect themselves and proactively confront potential situations before they become an acute threat.

Read the full Motorola Solutions White Paper here to learn more about the emergence of new attack vectors and how a holistic strategy can help defend against emerging cyber threats.

Cyber Resilience

You can learn more about our cybersecurity solutions at www.motorolasolutions.com/cybersecurity

Tro Mattern

Troy Mattern is Vice President of Cybersecurity Products and Services at Motorola Solutions.

Troy is on LinkedIn

 

Follow #ThinkPublicSafety, @MotsolsEMEA on Twitter

This post was originally published in our sister blog for North America - Fresh Ideas In Public Safety

Join Us