Artwork

Content provided by Sirius. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Sirius or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Weaponized Smart Devices and the Internet of Things

10:31
 
Share
 

Archived series ("Inactive feed" status)

When? This feed was archived on March 02, 2023 11:25 (1+ y ago). Last successful fetch was on January 03, 2023 09:55 (1+ y ago)

Why? Inactive feed status. Our servers were unable to retrieve a valid podcast feed for a sustained period.

What now? You might be able to find a more up-to-date version using the search function. This series will no longer be checked for updates. If you believe this to be in error, please check if the publisher's feed link below is valid and contact support to request the feed be restored or if you have any other concerns about this.

Manage episode 180275486 series 1334703
Content provided by Sirius. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Sirius or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Gartner predicts that through 2018, over 50 percent of Internet of Things (IoT) device manufacturers will not be able to address threats due to weak authentication practices. Millions of IoT devices — including everyday objects like routers, security cameras, DVRs, medical devices, cars and more — have already been infected with malware and repurposed as zombie armies by cyber attackers. As a result, the bandwidth of distributed denial of service (DDoS) attacks reached frightening levels in 2016, culminating with attacks of well over 600 Gbps.

Until device makers require unique passwords by default, it is up to us to protect ourselves. In this episode, host Cherie Caswell Dost speaks with Bryan Fischer, senior director, Forsythe Security Professional Services, about the ever-changing security challenges of IoT devices, and how organizations can mitigate associated risks.

Listen to the latest episode of And There You Have IT to learn:

  • How IoT continues to change the threat landscape.
  • The inherent and evolving risks that accompany smart devices.
  • How manufacturers are trying to shore up their devices.
  • How companies can take action against IoT-related risks.
  • Why robust authentication practices are critical.

Top 5 Cyber Security Predictions for 2017 – The security threat landscape continues to change and present new challenges. Here are five predictions for 2017 that are worth preparing for.

Mobile Device Security in the Workplace: 5 Key Risks and a Surprising Challenge – With well-supported mobility and security awareness programs, your organization can keep users happy and your network secure so you can compete in today’s mobile-first environment.

Forsythe Technology - For more than 40 years, Forsythe has helped companies succeed by working to optimize, modernize, and innovate enterprise IT. We develop solutions that make practical business sense from idea to implementation. We help champion innovation and deliver bottom-line results. We serve as the bridge, moving you from traditional to new IT. Whatever your business needs, we make it happen.

  continue reading

64 episodes

Artwork
iconShare
 

Archived series ("Inactive feed" status)

When? This feed was archived on March 02, 2023 11:25 (1+ y ago). Last successful fetch was on January 03, 2023 09:55 (1+ y ago)

Why? Inactive feed status. Our servers were unable to retrieve a valid podcast feed for a sustained period.

What now? You might be able to find a more up-to-date version using the search function. This series will no longer be checked for updates. If you believe this to be in error, please check if the publisher's feed link below is valid and contact support to request the feed be restored or if you have any other concerns about this.

Manage episode 180275486 series 1334703
Content provided by Sirius. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Sirius or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Gartner predicts that through 2018, over 50 percent of Internet of Things (IoT) device manufacturers will not be able to address threats due to weak authentication practices. Millions of IoT devices — including everyday objects like routers, security cameras, DVRs, medical devices, cars and more — have already been infected with malware and repurposed as zombie armies by cyber attackers. As a result, the bandwidth of distributed denial of service (DDoS) attacks reached frightening levels in 2016, culminating with attacks of well over 600 Gbps.

Until device makers require unique passwords by default, it is up to us to protect ourselves. In this episode, host Cherie Caswell Dost speaks with Bryan Fischer, senior director, Forsythe Security Professional Services, about the ever-changing security challenges of IoT devices, and how organizations can mitigate associated risks.

Listen to the latest episode of And There You Have IT to learn:

  • How IoT continues to change the threat landscape.
  • The inherent and evolving risks that accompany smart devices.
  • How manufacturers are trying to shore up their devices.
  • How companies can take action against IoT-related risks.
  • Why robust authentication practices are critical.

Top 5 Cyber Security Predictions for 2017 – The security threat landscape continues to change and present new challenges. Here are five predictions for 2017 that are worth preparing for.

Mobile Device Security in the Workplace: 5 Key Risks and a Surprising Challenge – With well-supported mobility and security awareness programs, your organization can keep users happy and your network secure so you can compete in today’s mobile-first environment.

Forsythe Technology - For more than 40 years, Forsythe has helped companies succeed by working to optimize, modernize, and innovate enterprise IT. We develop solutions that make practical business sense from idea to implementation. We help champion innovation and deliver bottom-line results. We serve as the bridge, moving you from traditional to new IT. Whatever your business needs, we make it happen.

  continue reading

64 episodes

Wszystkie odcinki

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide