Technology Magazine July 2024 | Page 109

IOT

“Enterprises should always conduct security assessments before deploying any networkconnected devices on their network ”

LEWIS DUKE SECOPS AND THREAT INTELLIGENCE LEAD , TREND MICRO
network segmentation and security monitoring should be a high priority ,” Lewis says . “ Governments can also play a vital role by establishing clear and standardised security requirements for IoT devices and also by helping to promote consumer awareness of the security risk associated with IoT devices .”
He continues : “ However , it remains crucial for individuals to proactively protect themselves against cyber threats , implementing two-factor authentication on their devices whenever possible and enabling encryption on their home routers . These measures , among others , are vital for safeguarding against the evolving risks in the cyber environment .”
The future of IoT is now : Harnessing the power of emerging technologies When it comes to implementing IoT device protections , there is still plenty to be done . Long-term , organisations will benefit from ensuring their devices are properly isolated which , as Nathan explains , could take the form of a zero trust architecture .
A zero trust framework can enable teams to have greater control over segmented networks , permit connectivity where needed and also prevent data breaches .
“ With the right partner , there is a lot organisations can do to deliver a zero trust deployed system in which there is no attack surface and exposure to unpatched services and unmanaged systems ,” he says . “ This approach removes those systems from being exposed to attacks and being seen , while still allowing them to function , which is where the evolution of approach to these issues will continue to develop .”
The world of technology continues to become more sophisticated , with disruptive technologies like artificial intelligence ( AI ) enabling faster innovation . However , with such an opportunity , organisations around the world still need to remain aware of cybersecurity risks .
“ SecOps teams need to be mindful of the risks new technology such as Quantum brings to the data traversing their network ,” Alex states .
technologymagazine . com 109