Getting alerts is only as good as the response to them. Without a response, they are just acting as a smoke screen for the penetrators. Those alerts should be converted into automatic actions of blocking, limiting access or quarantine of suspected devices. For blocking mechanism, the closer you do the blocking to the actual network infrastructure, like shutting down the actual Ethernet port, the more secure and affective you are.
How to approach keeping your IoT devices safe
-
by IoTNews
- Categories: Uncategorized
- Tags: How to approach keeping your IoT devices safe
Related Content
Relax: This phone measures your blood pressure
By
IoTNews
June 17, 2021
IoT, edge computing, and AI pay off for asset-based enterprises
By
IoTNews
June 17, 2021
Water-authority network upgrade spots problems faster
By
IoTNews
June 17, 2021
Cisco, AWS integrate IoT, edge network software and services
By
IoTNews
May 18, 2021
IoT, edge computing and AI projects pay off for asset-based enterprises
By
IoTNews
May 18, 2021