FEATURE: IoT
• Fall under control of a botnet to carry out
a specific, disruptive task such as DDoS
According to research conducted by the
team at FortiGuard Labs, IoT devices were
involved in half of the top 12 exploits
last year.
This is primarily due to the fact that most
IoT devices are designed with fault code, no
built-in security measures and an inability to
be updated even when network managers
identify a vulnerability.
IoT and the cloud: A uniquely
challenging combination
Every IoT device is potentially another
cloud connection and every connection
to the network represents yet another
security vulnerability.
So, what does this mean for your
organisation? As you develop new IoT
assets and move to the cloud, your security
strategies for both need to be in sync
with one another. When an IoT device is
Jonathan Nguyen-Duy, Vice President,
Global Field CISO Team, Fortinet
www.intelligentcio.com
INTELLIGENTCIO
43