Mastering IoT Security
The Internet of Things (IoT) has taken center stage in our increasingly technological world. Connected devices are becoming more practical and fordable for mainstream consumers, as well as an integral part of many businesses. We trust M2M applications to transmit confidential and personal information, monitor valuable assets, and control mission-critical devices.
However, as we are beginning to witness the limitless potential to save time, cut costs, increase efficiency, and improve quality of life, we are also made aware that with all these potential benefits, there is also potential for new instances of data vulnerability and security breaches.
A recent study released by HP Security Research reviewed 10 of the most popular IoT devices that included some form of cloud service and mobile applications. The results revealed that an alarming 70% were subject to serious security vulnerabilities. Some of these concerns included insufficient authentication/password strength, lack of transport encryption, weak web interface credentials, and insecure software updates.
Download the full white paper below to learn more.
Get unlimited access to:
Enter your credentials below to log in. Not yet a member of Field Technologies Online? Subscribe today.