Advertisement
Top
image credit: Pixabay

How IoT changes your threat model: 4 key considerations

May 11, 2020

IoT systems in business and operational environments have increased the attack surface and introduced new risks to the confidentiality, integrity and availability of critical data and systems at many enterprises.

Security leaders need to update their organization’s threat profile to account for these risks and implement a formal plan for proactively managing them. Otherwise they risk becoming soft targets for adversaries looking to exploit vulnerable IoT environments to spy, steal data, launch distributed denial of service (DDoS) attacks, escalate privileges and disrupt operations in other ways, analysts say.

Read More on CSO Online