Intelligent CISO Issue 54 | Page 39

Though the threats are real and the issues limiting effective security challenging , the value of IoT and OT are too great to ignore .
FEATURE despite the hard work of the staff administering the systems . There are frequent reports online showing insecure devices being sold with known vulnerabilities years after they are detected .
• Account and password mismanagement : The failure to properly manage accounts and passwords remains a critical issue . Thousands of security cameras used by numerous organisations were breached after an administrator ’ s account credentials were posted on the Internet .
• Weak and inconsistent monitoring : Effectively using SIEM and other cybersecurity tools to properly monitor IoT and OT devices and reliably detect threats has been extremely hard . This often results in these devices being monitored by a secondary system , or manually checked , or sometimes not monitored at all .
Though the threats are real and the issues limiting effective security challenging , the value of IoT and OT are too great to ignore .
Fortunately , properly securing IoT and OT devices is fairly straightforward . It starts at deployment when devices should be correctly configured . Promptly installing patches is also key as is practicing good cyber hygiene at all

Though the threats are real and the issues limiting effective security challenging , the value of IoT and OT are too great to ignore .

times . Additionally , maintaining an up-todate inventory of all IoT and OT devices is essential . Without such an inventory – which should include relevant information about all these assets – companies won ’ t have the visibility to protect these devices . u www . intelligentciso . com
39