{"id":2970,"date":"2021-08-23T15:38:09","date_gmt":"2021-08-23T15:38:09","guid":{"rendered":"https:\/\/davra.com\/?p=2970"},"modified":"2021-08-26T16:20:35","modified_gmt":"2021-08-26T16:20:35","slug":"why-a-secure-iot-platform-should-be-your-number-one-concern","status":"publish","type":"post","link":"https:\/\/davra.com\/why-a-secure-iot-platform-should-be-your-number-one-concern\/","title":{"rendered":"Why a Secure IoT Platform should be your number one concern."},"content":{"rendered":"

The ubiquity of IoT is bringing great analytics, data insights, and real-time knowledge into daily life across all industries. But if poorly designed, implemented and maintained, it also creates a cybersecurity nightmare. Just this year, we’ve seen (among other things):<\/span><\/p>\n

\u2022\u00a0 \u00a0<\/span>Security vulnerabilities in public and private Electric Vehicle (EV) charging<\/span><\/a>. This could have enabled the theft of electricity at a public charging station. An enterprising hacker could access user accounts at home, impede charging, and use the opportunity to enter and attack a home network.\u00a0\u00a0<\/span><\/p>\n

\u2022\u00a0 A software hack on a <\/span>Florida water treatment plant<\/span><\/a> where an intruder boosted the level of sodium hydroxide in the water supply to 100 times higher than normal. (Fortunately, staff thwarted the attack).<\/span><\/p>\n

\u2022\u00a0 The Colonial Pipeline attack: the largest ransomware cyberattack on an oil infrastructure target in the history of the United States.<\/span><\/p>\n

IoT security problems are not limited to critical infrastructure. Today a household may contain over 200 connected devices, each with its specific security requirements and varied life cycle – symbolic of a poorly interoperable and poorly regulated world of Internet of Things devices.<\/span><\/p>\n

Fortunately, at Davra, we’ve learned many ways to implement and enhance cybersecurity in our business and our product offerings. Here are some of the fundamental principles that any company can embrace and create a more secure IoT Platform.<\/span><\/p>\n

All people are responsible for security vigilance<\/b><\/h2>\n

Train and educate employees regularly about optimal security practices, from password management to phishing emails. For example, if you have staff working from home, good security practices include:<\/span><\/p>\n

\u2022\u00a0 Password protect the home router<\/span><\/p>\n

\u2022\u00a0 Device encryption\u00a0<\/span><\/p>\n

\u2022\u00a0 The use of only supported operating systems<\/span><\/p>\n

\u2022\u00a0 Regular software updates<\/span><\/p>\n

\u2022\u00a0 Two-factor authentication,\u00a0<\/span><\/p>\n

\u2022\u00a0 Use of a virtual private network (VPN)<\/span><\/p>\n

You are as only powerful as your weakest link<\/b><\/h2>\n

All devices are a potential entry point for an attack: an unsafe USB plugged into a work computer due to lax ‘bring your own device’ (BYOD) principles can spread a virus throughout an organisation quickly and easily.<\/span><\/p>\n

Likewise, attacking one system may not cripple your network but cause enough chaos and disarray to disable daily functionality. Imagine disabling the elevator control system or lighting in a hospital, for example.\u00a0 C<\/span>ompanies need to embed security practices within all facets of their organisation, with complete buy-in rather than cybersecurity as the security department’s sole responsibility.\u00a0<\/span><\/p>\n

Security by design as a minimum standard\u00a0<\/b><\/h2>\n

Embrace security by design principle in the products that we make. Security by design is about automating data security as the first principle of good product design, incorporating data security into design infrastructure \u2014 companies design software to be secure from the outset, reducing the likelihood of security vulnerabilities.\u00a0<\/span><\/p>\n

How Davra Creates a Secure IoT Platform<\/b><\/h2>\n

Security best practices can differ across industries and include additional data privacy requirements. At Davra, we follow well-recognised security processes and protocols to ensure we are up to date with emerging security challenges across the sectors we operate in.\u00a0<\/span><\/p>\n

We were awarded the NSAI IS EN ISO 9001:2015 & 27001 Certificate by the National Standards Authority of Ireland (NSAI). This sets out the essential requirements for a practical and effective quality management system (QMS) which is a system for minimising risk and maximising opportunity.\u00a0<\/span>The Standards help us improve customer satisfaction levels, internal efficiency and employee involvement. <\/span>Our compliance with the <\/span>FedRAMP<\/span><\/a> program ensures cloud security of US federal information. This is vital for any business selling services to the US Government.\u00a0<\/span><\/p>\n

We also adopt the principles of the <\/span>NIST security framework<\/span><\/a>.\u00a0<\/span>Cybersecurity challenges are constantly evolving and changing in our connected economy. Embedding responsibility within and throughout our organisations allows us to ensure the best IoT security practices for now and in the future.<\/span><\/p>\n

Author<\/b><\/h2>\n

Anthony Sayers, Director of IoT Ecosystems & Partners, Davra<\/span><\/p>\n

Connect on LinkedIn<\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"

The ubiquity of IoT is bringing great analytics, data insights, and real-time knowledge into daily life across all industries. But if poorly designed, implemented and maintained, it also creates a cybersecurity nightmare. Just this year, we’ve seen (among other things): \u2022\u00a0 \u00a0Security vulnerabilities in public and private Electric Vehicle (EV) charging. This could have enabled […]<\/p>\n","protected":false},"author":10,"featured_media":2971,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"yst_prominent_words":[75,108,1131,182,53,116,830,1068,834,1315],"_links":{"self":[{"href":"https:\/\/davra.com\/wp-json\/wp\/v2\/posts\/2970"}],"collection":[{"href":"https:\/\/davra.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/davra.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/davra.com\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/davra.com\/wp-json\/wp\/v2\/comments?post=2970"}],"version-history":[{"count":0,"href":"https:\/\/davra.com\/wp-json\/wp\/v2\/posts\/2970\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/davra.com\/wp-json\/wp\/v2\/media\/2971"}],"wp:attachment":[{"href":"https:\/\/davra.com\/wp-json\/wp\/v2\/media?parent=2970"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/davra.com\/wp-json\/wp\/v2\/categories?post=2970"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/davra.com\/wp-json\/wp\/v2\/tags?post=2970"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https:\/\/davra.com\/wp-json\/wp\/v2\/yst_prominent_words?post=2970"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}