SlideShare a Scribd company logo
1 of 1
Download to read offline
The Internet of Things (IoT) has become a reality, from
personal fitness trackers and self-ordering refrigerators to
coffee makers and door locks that can be operated through
your mobile phone.
Simply put, an IoT device is anything that connects to the
Internet in any way. This connectivity presents a host of
benefits, but it also provides new opportunities for malicious
hackers and thieves to steal sensitive information or provide
unwanted access to your network.
Here are four things you can do to minimize the chances
that your IoT device might be compromised, along with
other systems and data:
PUT A PASSWORD ON IT
From a hacker’s perspective, anything
connected to the Internet is an opportunity
to breach network defenses, whether it’s a
PC, a tablet, or a connected thermostat. For
that reason, all IoT devices and the
applications that run them need to be
secured with a password.
KEEP SOFTWARE
UPDATED
The IoT device software is the computer
code that tells your connected device how
to operate. When a vulnerability is
discovered, the manufacturer addresses it
with a software update or patch that
reduces risk to the IoT device. Be sure to
apply all software updates as soon as
possible.
TREAT ALL IoT DEVICES LIKE THE
COMPUTERS THEY ARE
You may think a malicious hacker has little to gain from breaching something as
simple as your IoT fitness tracker. But when it is connected to your network, then
all your devices and data are relying on your fitness tracker to fight off any
unwanted intrusions.
Treat your connected toaster or refrigerator like you would a new PC on your
network, and you’ll increase the security of your entire network in the process.
The Internet of Things is already delivering incredible benefits for consumers and organizations
alike, but there are many potential security risks as well. Be sure to follow the four strategies
above each time you connect an IoT device to your network to gain all of the benefits of IoT while
also minimizing your risk.
WAYS TO SECURE THE
INTERNET of THINGS
4
CHANGE THE
DEFAULT PASSWORD
Did your device come with its own
password built in? If so, replace it with
your own strong password instead. If your
device was assigned a manufacturer’s
password, it’s more likely other people
have it too. That makes it easier for a
malicious hacker to access your IoT device.
©2015 Avnet, Inc. All Rights Reserved • www.avnet.com

More Related Content

What's hot

What's hot (20)

Internet of Things (IoT) Security
Internet of Things (IoT) SecurityInternet of Things (IoT) Security
Internet of Things (IoT) Security
 
Privacy and Security in the Internet of Things
Privacy and Security in the Internet of ThingsPrivacy and Security in the Internet of Things
Privacy and Security in the Internet of Things
 
Lessons learned for internet of things
Lessons learned for internet of thingsLessons learned for internet of things
Lessons learned for internet of things
 
IoT & Robotics Overview
IoT & Robotics OverviewIoT & Robotics Overview
IoT & Robotics Overview
 
The Internet of Things – Good, Bad or Just Plain Ugly?
The Internet of Things – Good, Bad or Just Plain Ugly?The Internet of Things – Good, Bad or Just Plain Ugly?
The Internet of Things – Good, Bad or Just Plain Ugly?
 
Your Thing is Pwned - Security Challenges for the IoT
Your Thing is Pwned - Security Challenges for the IoTYour Thing is Pwned - Security Challenges for the IoT
Your Thing is Pwned - Security Challenges for the IoT
 
Top 10 Cyber Security Tips for SMEs
Top 10 Cyber Security Tips for SMEsTop 10 Cyber Security Tips for SMEs
Top 10 Cyber Security Tips for SMEs
 
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016
 
Internet of Things: Challenges and Issues
Internet of Things: Challenges and IssuesInternet of Things: Challenges and Issues
Internet of Things: Challenges and Issues
 
Securing Internet of Things
Securing Internet of ThingsSecuring Internet of Things
Securing Internet of Things
 
review on Internet Of Things
review on Internet Of Thingsreview on Internet Of Things
review on Internet Of Things
 
The Internet of Things Isn't Coming, It's Here
The Internet of Things Isn't Coming, It's HereThe Internet of Things Isn't Coming, It's Here
The Internet of Things Isn't Coming, It's Here
 
Onboarding in the IoT
Onboarding in the IoTOnboarding in the IoT
Onboarding in the IoT
 
IoT Attack Surfaces -- DEFCON 2015
IoT Attack Surfaces -- DEFCON 2015IoT Attack Surfaces -- DEFCON 2015
IoT Attack Surfaces -- DEFCON 2015
 
Next-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeNext-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space Age
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
 
Cyren cybersecurity of things
Cyren cybersecurity of thingsCyren cybersecurity of things
Cyren cybersecurity of things
 
AreWePreparedForIoT
AreWePreparedForIoTAreWePreparedForIoT
AreWePreparedForIoT
 
STSAFE-A: certified security for IoT devices and services
STSAFE-A: certified security for IoT devices and servicesSTSAFE-A: certified security for IoT devices and services
STSAFE-A: certified security for IoT devices and services
 
Create WiFi Hotspot on Windows 7
Create WiFi Hotspot on Windows 7 Create WiFi Hotspot on Windows 7
Create WiFi Hotspot on Windows 7
 

Similar to Four ways to secure the internet of things - infographic

IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
mariuse18nolet
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
voversbyobersby
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
vrickens
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
tjane3
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
lmelaine
 
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperKSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
Martin Ruubel
 

Similar to Four ways to secure the internet of things - infographic (20)

IoT Security.pdf
IoT Security.pdfIoT Security.pdf
IoT Security.pdf
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
 
Internet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security AnalysisInternet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security Analysis
 
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
 
COMPUTER NETWORKS IOT BASED.pptx
COMPUTER NETWORKS IOT BASED.pptxCOMPUTER NETWORKS IOT BASED.pptx
COMPUTER NETWORKS IOT BASED.pptx
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
IOT and Security.pptx
IOT and Security.pptxIOT and Security.pptx
IOT and Security.pptx
 
IOT and Security.pptx
IOT and Security.pptxIOT and Security.pptx
IOT and Security.pptx
 
A Quick Guide On What Is IoT Security_.pptx
A Quick Guide On What Is IoT Security_.pptxA Quick Guide On What Is IoT Security_.pptx
A Quick Guide On What Is IoT Security_.pptx
 
Dissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinhaDissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinha
 
Security and Privacy challenges of the Internet of Things (IoT) | Sysfore
Security and Privacy challenges of the Internet of Things (IoT) | SysforeSecurity and Privacy challenges of the Internet of Things (IoT) | Sysfore
Security and Privacy challenges of the Internet of Things (IoT) | Sysfore
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 
IOT LADEN GHISING.pptx
IOT LADEN GHISING.pptxIOT LADEN GHISING.pptx
IOT LADEN GHISING.pptx
 
The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy
 
The internet of things (io t)
The internet of things (io t)The internet of things (io t)
The internet of things (io t)
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperKSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
 

More from Cheapest SSLs

Shellshock "BashBug" - The 25 Year Old Bug Vulnerability
Shellshock "BashBug" - The 25 Year Old Bug VulnerabilityShellshock "BashBug" - The 25 Year Old Bug Vulnerability
Shellshock "BashBug" - The 25 Year Old Bug Vulnerability
Cheapest SSLs
 
SSL Certificate Management Infographic - Symantec
SSL Certificate Management Infographic - SymantecSSL Certificate Management Infographic - Symantec
SSL Certificate Management Infographic - Symantec
Cheapest SSLs
 
Protect data in transit across your business and around the world
Protect data in transit across your business and around the worldProtect data in transit across your business and around the world
Protect data in transit across your business and around the world
Cheapest SSLs
 
Is your data safe Infographic by Symantec
Is your data safe Infographic by SymantecIs your data safe Infographic by Symantec
Is your data safe Infographic by Symantec
Cheapest SSLs
 
LinkedIn Password Lifted - Infographic
LinkedIn Password Lifted - InfographicLinkedIn Password Lifted - Infographic
LinkedIn Password Lifted - Infographic
Cheapest SSLs
 

More from Cheapest SSLs (20)

Beware Of More Targeted Attacks And Data Breaches - Infographic
Beware Of More Targeted Attacks And Data Breaches - InfographicBeware Of More Targeted Attacks And Data Breaches - Infographic
Beware Of More Targeted Attacks And Data Breaches - Infographic
 
Mobile Device Security Infographic
Mobile Device Security InfographicMobile Device Security Infographic
Mobile Device Security Infographic
 
2015 Verizon Data Breach Investigations Report
2015 Verizon Data Breach Investigations Report2015 Verizon Data Breach Investigations Report
2015 Verizon Data Breach Investigations Report
 
Internet Security Threat Report 2015
Internet Security Threat Report 2015Internet Security Threat Report 2015
Internet Security Threat Report 2015
 
A Beginner's Guide to Encryption - Infographic
A Beginner's Guide to Encryption - InfographicA Beginner's Guide to Encryption - Infographic
A Beginner's Guide to Encryption - Infographic
 
Why private browsing doesn't exist and how to fix it
Why private browsing doesn't exist and how to fix itWhy private browsing doesn't exist and how to fix it
Why private browsing doesn't exist and how to fix it
 
Business Critical SSL Certificate Management - Infographic
Business Critical SSL Certificate Management - InfographicBusiness Critical SSL Certificate Management - Infographic
Business Critical SSL Certificate Management - Infographic
 
State of mobile app security infographic
State of mobile app security infographicState of mobile app security infographic
State of mobile app security infographic
 
BYOD and Physical Security Infographic
BYOD and Physical Security InfographicBYOD and Physical Security Infographic
BYOD and Physical Security Infographic
 
12 Tips To Boost Trust & Conversions This Christmas with Thawte
12 Tips To Boost Trust & Conversions This Christmas with Thawte12 Tips To Boost Trust & Conversions This Christmas with Thawte
12 Tips To Boost Trust & Conversions This Christmas with Thawte
 
Shellshock "BashBug" - The 25 Year Old Bug Vulnerability
Shellshock "BashBug" - The 25 Year Old Bug VulnerabilityShellshock "BashBug" - The 25 Year Old Bug Vulnerability
Shellshock "BashBug" - The 25 Year Old Bug Vulnerability
 
Symantec Always On SSL Infographic
Symantec Always On SSL InfographicSymantec Always On SSL Infographic
Symantec Always On SSL Infographic
 
SSL Certificate Management Infographic - Symantec
SSL Certificate Management Infographic - SymantecSSL Certificate Management Infographic - Symantec
SSL Certificate Management Infographic - Symantec
 
Protect data in transit across your business and around the world
Protect data in transit across your business and around the worldProtect data in transit across your business and around the world
Protect data in transit across your business and around the world
 
How attackers hack atm & withdraw cash from an atm using a phone - Infographic
How attackers hack atm & withdraw cash from an atm using a phone - InfographicHow attackers hack atm & withdraw cash from an atm using a phone - Infographic
How attackers hack atm & withdraw cash from an atm using a phone - Infographic
 
Is your data safe Infographic by Symantec
Is your data safe Infographic by SymantecIs your data safe Infographic by Symantec
Is your data safe Infographic by Symantec
 
2013 sets data breach record - Infographic
2013 sets data breach record - Infographic2013 sets data breach record - Infographic
2013 sets data breach record - Infographic
 
LinkedIn Password Lifted - Infographic
LinkedIn Password Lifted - InfographicLinkedIn Password Lifted - Infographic
LinkedIn Password Lifted - Infographic
 
What really happens when you lose your phone? - Symantec
What really happens when you lose your phone? - SymantecWhat really happens when you lose your phone? - Symantec
What really happens when you lose your phone? - Symantec
 
Webmail Security Tips by CheapestSSLs.com
Webmail Security Tips by CheapestSSLs.comWebmail Security Tips by CheapestSSLs.com
Webmail Security Tips by CheapestSSLs.com
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 

Four ways to secure the internet of things - infographic

  • 1. The Internet of Things (IoT) has become a reality, from personal fitness trackers and self-ordering refrigerators to coffee makers and door locks that can be operated through your mobile phone. Simply put, an IoT device is anything that connects to the Internet in any way. This connectivity presents a host of benefits, but it also provides new opportunities for malicious hackers and thieves to steal sensitive information or provide unwanted access to your network. Here are four things you can do to minimize the chances that your IoT device might be compromised, along with other systems and data: PUT A PASSWORD ON IT From a hacker’s perspective, anything connected to the Internet is an opportunity to breach network defenses, whether it’s a PC, a tablet, or a connected thermostat. For that reason, all IoT devices and the applications that run them need to be secured with a password. KEEP SOFTWARE UPDATED The IoT device software is the computer code that tells your connected device how to operate. When a vulnerability is discovered, the manufacturer addresses it with a software update or patch that reduces risk to the IoT device. Be sure to apply all software updates as soon as possible. TREAT ALL IoT DEVICES LIKE THE COMPUTERS THEY ARE You may think a malicious hacker has little to gain from breaching something as simple as your IoT fitness tracker. But when it is connected to your network, then all your devices and data are relying on your fitness tracker to fight off any unwanted intrusions. Treat your connected toaster or refrigerator like you would a new PC on your network, and you’ll increase the security of your entire network in the process. The Internet of Things is already delivering incredible benefits for consumers and organizations alike, but there are many potential security risks as well. Be sure to follow the four strategies above each time you connect an IoT device to your network to gain all of the benefits of IoT while also minimizing your risk. WAYS TO SECURE THE INTERNET of THINGS 4 CHANGE THE DEFAULT PASSWORD Did your device come with its own password built in? If so, replace it with your own strong password instead. If your device was assigned a manufacturer’s password, it’s more likely other people have it too. That makes it easier for a malicious hacker to access your IoT device. ©2015 Avnet, Inc. All Rights Reserved • www.avnet.com