IoT: The Insecurity of Everything

 In Cyber Security, Prescient News

Earlier this week, Jerry Irvine, Prescient Solutions CIO and Partner, presented at the Midwest Accounting & Finance Showcase in Rosemont, IL.

Jerry’s session, “IOT: The Insecurity of Everything” taught attendees the weakest links in cyber security and how to minimize their threats. View a summary of the session below:

“Mobile devices can now access your network through anything from thermostats and garage door openers to toasters. Remote users who have access to your internal network provide insecure back doors to your core systems and data. The implementation of IoT even at vendors’ locations or remote employees’ homes can affect compliance of SOX, PCI, and even HIPAA. Understanding vulnerabilities of the IoT can help the organization to implement policies, processes and standards to mitigate the potential for loss.”

weakest links in cybersecurity

For more cyber security news and information, visit the links below:

Take Precautions So Your Smart Devices Don’t Introduce Stupid Security Risks: IoT devices are typically small, so they don’t have a lot of computing capacity. That means they can’t always support typical security measures like strong encryption on the data they transmit over the network.

Digital Vulnerability Series Wrap-Up: Just how vulnerable are you in the digital world? The reality is more than you probably think. Jerry Irvine, Prescient Solutions CIO and Partner and member of the U.S. Chamber of Commerce’s Cyber-Security Leadership Council, discussed this topic on WGN-TV’s hack week.

The Yin and Yang of Cloud Security: There are two aspects of security in the cloud; as with yin and yang, they are complementary, interconnected, and both necessary to achieve an integrated, wholly secure cloud computing environment.

5 Ways a Data Breach Can Cost You: You know how valuable the information your company holds is to you. A successful data breach can net hackers a small fortune—and cost you a large one.

Recent Posts

Leave a Comment

encryption protect dataHire IT consultant guide