{"id":14125,"date":"2020-09-18T17:22:18","date_gmt":"2020-09-18T20:22:18","guid":{"rendered":"https:\/\/ostec.blog\/?p=14125"},"modified":"2020-09-18T17:23:55","modified_gmt":"2020-09-18T20:23:55","slug":"internet-of-things-security","status":"publish","type":"post","link":"https:\/\/ostec.blog\/en\/perimeter\/internet-of-things-security\/","title":{"rendered":"Internet of Things: Learn how to ensure your security"},"content":{"rendered":"<p>The number of devices connected to the internet and among themselves is increasing. In homes, for example, cell phones connect to routers, which talk to TV and media devices. Electronic locks, surveillance systems and many others are already a reality in our country.<\/p>\n<p>According to a\u00a0<a href=\"https:\/\/gtnr.it\/2x5ixBw\">Gartner report<\/a>, the forecast is that by 2020 there will already be more than 20 billion connected devices.<\/p>\n<p>With so many \u201cthings\u201d connected, the\u00a0<a href=\"https:\/\/ostec.blog\/geral\/internet-coisas-desafios-seguranca\">security challenges<\/a>\u00a0become immense. How to protect these devices? Is there a way to prevent these from being used as vectors of attacks that cause damage to companies and people?<\/p>\n<p><a href=\"https:\/\/ostec.blog\/seguranca-perimetro\/impactos-falhas-seguranca-iot\">Industry 4.0 also suffers from the impacts of security breaches<\/a>. Today, a good part of the equipment present in the industries is connected to the internet, enabling a series of facilities for the management and control of these devices. How to prevent, then, that a security breach puts the operation of this equipment at risk?<\/p>\n<p>In this blog post we will bring basic guidelines about good practices for IoT security, so that technology professionals minimize the risks associated with the use of this technology in companies of the most varied sizes and segments. Read on!<\/p>\n<h2>Why are IoT devices more vulnerable?<\/h2>\n<p>This is one of the great doubts of professionals who use this type of technology in their structures. The reason why IoT products are substantially more vulnerable is linked to the architecture used for their development. Most of the time, these are devices with very limited physical resources (processing, memory, etc.), which prevent the implementation of security mechanisms in their structures.<\/p>\n<p>Therefore, when using products with these characteristics, the application of security devices is highly recommended to minimize the success and impact of attacks aimed at exploiting vulnerabilities present in these devices.<\/p>\n<h2>Practical tips for securing IoT devices<\/h2>\n<p>Knowing the security limitations that exist in these devices, it is possible to suggest some basic tips to protect corporate networks that are often also used to traffic information from these devices.<\/p>\n<h2>Purchase certified devices<\/h2>\n<p>One of the neglected points during the purchase of IoT devices, is the purchase motivated by the price. It is highly relevant that professionals also evaluate minimum levels of adequacy of these devices to RFCs, or some other type of standardization existing in the market. It is also important to evaluate brands that have nohall in the development of this type of technology to minimize the risks associated with the use of low-quality devices, therefore more susceptible to vulnerabilities.<\/p>\n<h2>Maps all IoT devices<\/h2>\n<p>It is essential that every IoT devices used in the company\u2019s daily routine are mapped and properly controlled by specialized tools. Having knowledge about all devices is the best way to guarantee the security of the corporate network. Therefore, it is important that technology professionals make efforts to prevent IoT devices from being inserted into the company without prior approval.<\/p>\n<h2>Physically isolate these devices<\/h2>\n<p>This is a good security practice that should also be applied to networks that traffic data from IoT devices. It is indicated that specific networks are established to connect the IoT devices, being physically isolated from the company\u2019s administrative network. This type of attitude prevents the malicious user from gaining access to computers and other assets that are connected to the corporate network in the event of an IoT device being compromised.<\/p>\n<p>There are specific network designs to specifically connect IoT devices, however, most of them still use the same network and internet used in organizations.<\/p>\n<h2>Establish IoT device-specific security policies<\/h2>\n<p>It is important to know the purpose of each IoT device and to implement specific control policies for each case. It is possible to exemplify, using the scenario of a hospital that has resonance equipment, whose maintenance is performed remotely by professionals in Germany. This equipment has internet connectivity, with the purpose of sending reports to the manufacturer and also interventions aimed at maintaining the equipment.<\/p>\n<p>This is a very common scenario in day-to-day hospitals, however it inspires care, such as ensuring secure remote access to the equipment manufacturer, using a VPN feature. Another possibility is to restrict the equipment\u2019s communication with the internet to the minimum necessary levels. Among other alternatives to minimize the chances of this equipment being compromised in attempts of virtual attacks.<\/p>\n<h2>Keep your IoT device always up to date<\/h2>\n<p>Attacks usually occur due to exploitation of flaws present in the software layer of IoT devices. When this happens, developers typically offer fixes to prevent their products from being compromised. Therefore, never fail to apply the updates suggested by the manufacturers. Updates prevent attacks from exploiting known and fixed vulnerabilities.<\/p>\n<h2>Use security solutions to protect your corporate network<\/h2>\n<p>There are several hardware and software that can work together to ensure an extra layer of protection for corporate networks, preventing attacks focused on IoT devices from taking greater proportions on the corporate network.<\/p>\n<p><a href=\"https:\/\/www.ostec.com.br\/produto\/ostec-utm\">UTM Firewall<\/a>\u00a0solutions are good options to start the process of shielding corporate networks that have IoT devices connected to their structure.<\/p>\n<p>In addition, if necessary,\u00a0<a href=\"https:\/\/content.ostec.com.br\/especialista-duvida\/\">talk to the OSTEC team of experts<\/a>. Our professionals are available to answer your questions about the use of specialized software and hardware for digital security and Internet of Things (IoT).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The number of devices connected to the internet and among themselves is increasing. In homes, for example, cell phones connect to routers, which talk to TV and media devices. Electronic locks, surveillance systems and many others are already a reality in our country. According to a\u00a0Gartner report, the forecast is that by 2020 there will [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":14128,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[984,411,424],"tags":[],"class_list":["post-14125","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","category-perimeter","category-solution-appreciation"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Internet of Things: Learn how to ensure your security - OSTEC | Seguran\u00e7a digital de resultados<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ostec.blog\/en\/perimeter\/internet-of-things-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Internet of Things: Learn how to ensure your security - OSTEC | Seguran\u00e7a digital de resultados\" \/>\n<meta property=\"og:description\" content=\"The number of devices connected to the internet and among themselves is increasing. In homes, for example, cell phones connect to routers, which talk to TV and media devices. Electronic locks, surveillance systems and many others are already a reality in our country. According to a\u00a0Gartner report, the forecast is that by 2020 there will [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ostec.blog\/en\/perimeter\/internet-of-things-security\/\" \/>\n<meta property=\"og:site_name\" content=\"OSTEC | Seguran\u00e7a digital de resultados\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ostec\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-18T20:22:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-09-18T20:23:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ostec.blog\/wp-content\/uploads\/2019\/08\/oper\u00e1rio-com-notebook.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"928\" \/>\n\t<meta property=\"og:image:height\" content=\"534\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Thais Souza\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ostecsecurity\" \/>\n<meta name=\"twitter:site\" content=\"@ostecsecurity\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/internet-of-things-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/internet-of-things-security\/\"},\"author\":{\"name\":\"Thais Souza\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/ca88ecd81da20ed5773cd0959c645c33\"},\"headline\":\"Internet of Things: Learn how to ensure your security\",\"datePublished\":\"2020-09-18T20:22:18+00:00\",\"dateModified\":\"2020-09-18T20:23:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/internet-of-things-security\/\"},\"wordCount\":874,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ostec.blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/internet-of-things-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2019\/08\/oper\u00e1rio-com-notebook.jpg\",\"articleSection\":[\"General\",\"Perimeter\",\"Solution appreciation\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ostec.blog\/en\/perimeter\/internet-of-things-security\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/internet-of-things-security\/\",\"url\":\"https:\/\/ostec.blog\/en\/perimeter\/internet-of-things-security\/\",\"name\":\"Internet of Things: Learn how to ensure your security - OSTEC | Seguran\u00e7a digital de resultados\",\"isPartOf\":{\"@id\":\"https:\/\/ostec.blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/internet-of-things-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/internet-of-things-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2019\/08\/oper\u00e1rio-com-notebook.jpg\",\"datePublished\":\"2020-09-18T20:22:18+00:00\",\"dateModified\":\"2020-09-18T20:23:55+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/internet-of-things-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ostec.blog\/en\/perimeter\/internet-of-things-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/internet-of-things-security\/#primaryimage\",\"url\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2019\/08\/oper\u00e1rio-com-notebook.jpg\",\"contentUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2019\/08\/oper\u00e1rio-com-notebook.jpg\",\"width\":928,\"height\":534},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/internet-of-things-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/ostec.blog\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet of Things: Learn how to ensure your security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ostec.blog\/#website\",\"url\":\"https:\/\/ostec.blog\/\",\"name\":\"OSTEC | Seguran\u00e7a digital de resultados\",\"description\":\"Empresa especializada na oferta de produtos e servi\u00e7os de seguran\u00e7a digital.\",\"publisher\":{\"@id\":\"https:\/\/ostec.blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ostec.blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ostec.blog\/#organization\",\"name\":\"OSTEC Business Security\",\"url\":\"https:\/\/ostec.blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png\",\"contentUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png\",\"width\":251,\"height\":67,\"caption\":\"OSTEC Business Security\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ostec\",\"https:\/\/x.com\/ostecsecurity\",\"https:\/\/www.instagram.com\/ostecsecurity\/\",\"https:\/\/linkedin.com\/company\/ostec-security\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/ca88ecd81da20ed5773cd0959c645c33\",\"name\":\"Thais Souza\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/400dde6458954de06efa803109767977?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/400dde6458954de06efa803109767977?s=96&d=mm&r=g\",\"caption\":\"Thais Souza\"},\"url\":\"https:\/\/ostec.blog\/en\/author\/thais-souza\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Internet of Things: Learn how to ensure your security - OSTEC | Seguran\u00e7a digital de resultados","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ostec.blog\/en\/perimeter\/internet-of-things-security\/","og_locale":"en_US","og_type":"article","og_title":"Internet of Things: Learn how to ensure your security - OSTEC | Seguran\u00e7a digital de resultados","og_description":"The number of devices connected to the internet and among themselves is increasing. In homes, for example, cell phones connect to routers, which talk to TV and media devices. Electronic locks, surveillance systems and many others are already a reality in our country. According to a\u00a0Gartner report, the forecast is that by 2020 there will [&hellip;]","og_url":"https:\/\/ostec.blog\/en\/perimeter\/internet-of-things-security\/","og_site_name":"OSTEC | Seguran\u00e7a digital de resultados","article_publisher":"https:\/\/www.facebook.com\/ostec","article_published_time":"2020-09-18T20:22:18+00:00","article_modified_time":"2020-09-18T20:23:55+00:00","og_image":[{"width":928,"height":534,"url":"https:\/\/ostec.blog\/wp-content\/uploads\/2019\/08\/oper\u00e1rio-com-notebook.jpg","type":"image\/jpeg"}],"author":"Thais Souza","twitter_card":"summary_large_image","twitter_creator":"@ostecsecurity","twitter_site":"@ostecsecurity","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ostec.blog\/en\/perimeter\/internet-of-things-security\/#article","isPartOf":{"@id":"https:\/\/ostec.blog\/en\/perimeter\/internet-of-things-security\/"},"author":{"name":"Thais Souza","@id":"https:\/\/ostec.blog\/#\/schema\/person\/ca88ecd81da20ed5773cd0959c645c33"},"headline":"Internet of Things: Learn how to ensure your security","datePublished":"2020-09-18T20:22:18+00:00","dateModified":"2020-09-18T20:23:55+00:00","mainEntityOfPage":{"@id":"https:\/\/ostec.blog\/en\/perimeter\/internet-of-things-security\/"},"wordCount":874,"commentCount":0,"publisher":{"@id":"https:\/\/ostec.blog\/#organization"},"image":{"@id":"https:\/\/ostec.blog\/en\/perimeter\/internet-of-things-security\/#primaryimage"},"thumbnailUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2019\/08\/oper\u00e1rio-com-notebook.jpg","articleSection":["General","Perimeter","Solution appreciation"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ostec.blog\/en\/perimeter\/internet-of-things-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ostec.blog\/en\/perimeter\/internet-of-things-security\/","url":"https:\/\/ostec.blog\/en\/perimeter\/internet-of-things-security\/","name":"Internet of Things: Learn how to ensure your security - OSTEC | Seguran\u00e7a digital de resultados","isPartOf":{"@id":"https:\/\/ostec.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ostec.blog\/en\/perimeter\/internet-of-things-security\/#primaryimage"},"image":{"@id":"https:\/\/ostec.blog\/en\/perimeter\/internet-of-things-security\/#primaryimage"},"thumbnailUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2019\/08\/oper\u00e1rio-com-notebook.jpg","datePublished":"2020-09-18T20:22:18+00:00","dateModified":"2020-09-18T20:23:55+00:00","breadcrumb":{"@id":"https:\/\/ostec.blog\/en\/perimeter\/internet-of-things-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ostec.blog\/en\/perimeter\/internet-of-things-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ostec.blog\/en\/perimeter\/internet-of-things-security\/#primaryimage","url":"https:\/\/ostec.blog\/wp-content\/uploads\/2019\/08\/oper\u00e1rio-com-notebook.jpg","contentUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2019\/08\/oper\u00e1rio-com-notebook.jpg","width":928,"height":534},{"@type":"BreadcrumbList","@id":"https:\/\/ostec.blog\/en\/perimeter\/internet-of-things-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/ostec.blog\/en\/"},{"@type":"ListItem","position":2,"name":"Internet of Things: Learn how to ensure your security"}]},{"@type":"WebSite","@id":"https:\/\/ostec.blog\/#website","url":"https:\/\/ostec.blog\/","name":"OSTEC | Seguran\u00e7a digital de resultados","description":"Empresa especializada na oferta de produtos e servi\u00e7os de seguran\u00e7a digital.","publisher":{"@id":"https:\/\/ostec.blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ostec.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ostec.blog\/#organization","name":"OSTEC Business Security","url":"https:\/\/ostec.blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ostec.blog\/#\/schema\/logo\/image\/","url":"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png","contentUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png","width":251,"height":67,"caption":"OSTEC Business Security"},"image":{"@id":"https:\/\/ostec.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ostec","https:\/\/x.com\/ostecsecurity","https:\/\/www.instagram.com\/ostecsecurity\/","https:\/\/linkedin.com\/company\/ostec-security"]},{"@type":"Person","@id":"https:\/\/ostec.blog\/#\/schema\/person\/ca88ecd81da20ed5773cd0959c645c33","name":"Thais Souza","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ostec.blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/400dde6458954de06efa803109767977?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/400dde6458954de06efa803109767977?s=96&d=mm&r=g","caption":"Thais Souza"},"url":"https:\/\/ostec.blog\/en\/author\/thais-souza\/"}]}},"_links":{"self":[{"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/posts\/14125","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/comments?post=14125"}],"version-history":[{"count":0,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/posts\/14125\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/media\/14128"}],"wp:attachment":[{"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/media?parent=14125"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/categories?post=14125"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/tags?post=14125"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}