Showing posts with label Data Security. Show all posts
Showing posts with label Data Security. Show all posts

Saturday, January 30, 2021

Shadow IoT

Shadow IoT | #TpromoCom #IoT #ShadowIoT #CyberSecurity | A big security problem can become a bigger opportunity for channel pros who can detect, secure, and manage rogue smart devices connected to business networks. https://bit.ly/3tbfBzK (James E. Gaskin

BUSINESSES HAVE STRUGGLED for decades with “shadow IT”—printers, laptops, smartphones, cloud services, and more being installed or subscribed to by users without permission or knowledge of an IT admin. In that same vein, users are now connecting smart devices of various kinds to the corporate network, giving rise to the term “shadow IoT.”

It’s a much bigger problem too, according to Zeus Kerravala, principal analyst at ZK Research, "because the scope has broadened. Things you never would have connected before are now connecting." As an example, he cites the Target breach from a few years ago. "The AC system was compromised, and it was on the same network as the point-of-sale system." When the hackers went through the AC system to the POS server, red flags theoretically should have gone up and the AC system should have been immediately quarantined.

Interested in knowing more about Shadow IoT and how to prevent it? 


Follow us on Social Media or email us:

Tuesday, January 12, 2021

What is a honeypot?

What is a honeypot? | #TpromoCom #Hacker #Server #Network #Security | Honeypots are decoy systems or servers deployed alongside production systems within your network (rapid7.com) https://bit.ly/3qdcd4P


When deployed as enticing targets for attackers, honeypots can add security monitoring opportunities for blue teams and misdirect the adversary from their true target. Honeypots come in a variety of complexities depending on the needs of your organization and can be a significant line of defense when it comes to flagging attacks early. 


This page will get into more detail on what honeypots are, how they are used, and the benefits of implementing them. 




Follow us on Social Media or email us: