- Community Home
- >
- Servers and Operating Systems
- >
- Servers & Systems: The Right Compute
- >
- IoT security management for SMBs: A growing challe...
-
-
Forums
- Products
- Servers and Operating Systems
- Storage
- Software
- Services
- HPE GreenLake
- Company
- Events
- Webinars
- Partner Solutions and Certifications
- Local Language
- China - 简体中文
- Japan - 日本語
- Korea - 한국어
- Taiwan - 繁體中文
-
- Advancing Life & Work
- Advantage EX
- Alliances
- Around the Storage Block
- HPE Ezmeral: Uncut
- OEM Solutions
- Servers & Systems: The Right Compute
- Tech Insights
- The Cloud Experience Everywhere
- HPE Blog, Austria, Germany & Switzerland
- Blog HPE, France
- HPE Blog, Italy
- HPE Blog, Japan
- HPE Blog, Middle East
- HPE Blog, Latin America
- HPE Blog, Russia
- HPE Blog, Saudi Arabia
- HPE Blog, South Africa
- HPE Blog, UK & Ireland
- HPE Blog, Poland
-
Blogs
- Advancing Life & Work
- Advantage EX
- Alliances
- Around the Storage Block
- HPE Blog, Latin America
- HPE Blog, Middle East
- HPE Blog, Saudi Arabia
- HPE Blog, South Africa
- HPE Blog, UK & Ireland
- HPE Ezmeral: Uncut
- OEM Solutions
- Servers & Systems: The Right Compute
- Tech Insights
- The Cloud Experience Everywhere
-
Information
- Community
- Welcome
- Getting Started
- FAQ
- Ranking Overview
- Rules of Participation
- Tips and Tricks
- Resources
- Announcements
- Email us
- Feedback
- Information Libraries
- Integrated Systems
- Networking
- Servers
- Storage
- Other HPE Sites
- Support Center
- Aruba Airheads Community
- Enterprise.nxt
- HPE Dev Community
- Cloud28+ Community
- Marketplace
-
Forums
-
Forums
-
Blogs
-
Information
-
English
- Subscribe to RSS Feed
- Mark as New
- Mark as Read
- Bookmark
- Receive email notifications
- Email to a Friend
- Printer Friendly Page
- Report Inappropriate Content
IoT security management for SMBs: A growing challenge with new solutions
IoT devices are an exploding security risk requiring urgent solutions. How can small and midsize businesses properly manage IoT security with limited resources?
The Internet of Things (IoT) has exploded as businesses and consumers rush to install connected devices. However, IoT management is also a huge challenge, as IoT devices are especially vulnerable to attack. According to a December 2017 Spiceworks survey, more than half of IT professionals view IoT devices as "extremely vulnerable" to Wi-Fi attacks.
IoT devices include seemingly harmless appliances, such as smart thermostats and lightbulbs, in addition to smart locks on homes and cars, which may represent a more lucrative opportunity for hackers.
As the complexity of IoT increases with the release of each new device, how can IT departments properly manage their IoT strategy?
The growing challenge of IoT usage
Most IT teams are already strapped for resources, and the proliferation of IoT devices could easily overwhelm them with a host of security problems. IoT devices don't tend to require complex passwords, and they typically don't include strong encryption. Their web interfaces can also offer tempting security vulnerabilities for would-be attackers.
In 2018, the FBI issued a public service announcement warning of the dangers of unprotected IoT devices, with tips for defending against cyberattacks. The Federal Trade Commission has also gone on record publicizing the risks of IoT, and calling for better security practices.
Tips for better IoT security
So, how should businesses tackle the maze of IoT management issues? It's essential to spot and address any security vulnerabilities prior to deployment, such as easily stolen user credentials or insufficient protections for personal data.
If devices are attacked, it could pose a monumental challenge to resource-strapped IT teams lacking IoT expertise. At the same time, IoT security management can't be left to the vendors of the devices, as they're often left scrambling to fix vulnerabilities after a breach has already occurred. The goal is to find a balance between the two. Look for vendors who build security into their products, but also ensure the rest of your network is as secure as possible before investing in IoT.
Team up with a partner
Fortunately, there are smart IoT security management solutions to address the growing need for properly managed connected devices. IT teams can tap the skills of a partner with deep knowledge of the security risks and overall threat environment unique to IoT devices.
Such a partner can conduct a thorough security test of your IoT solution before deployment, analyzing vulnerabilities from several angles and providing a report with an in-depth assessment and actionable follow-up steps. From there, the partner can help craft a plan for prioritizing and addressing the issues, including remediation scans to validate fixes.
IT teams can also employ managed security testing and evaluation services to assess the vulnerabilities of IoT devices being considered for deployment. Businesses can augment their IT teams' capabilities as needed in a flexible, scalable, and budget-friendly manner without hiring additional staff or investing in pricey software or hardware that may or may not deliver results.
With thoughtful attention to the security risks inherent in IoT devices, business owners can take advantage of all the benefits this new technology has to offer while still safeguarding their business and their customers.
Learn about the new era of cyber warfare aimed at exploiting hardware vulnerabilities in this free report from Frost & Sullivan: Server Security Lies Deep in Hardware
Looking for the latest information on technologies that are transforming SMBs? Look no further than these Worldwide SMB 2020 Predictions.
Ready to take the next step? Check out the SMB Hybrid IT for Dummies Guide. Because there are no "dumb" questions!
Learn more about HPE Small Business Solutions.
Or are you ready to purchase? Visit the HPE Store.
RobertChecketts
Robert has over 25+ years of IT Marketing and Product Management leadership experience spanning country, Regional and WW organizations. Robert is a marketing executive with extensive experience in field marketing, channel marketing and product marketing on a global basis and is driven to deliver SMB’s end-to-end affordable infrastructure that’s secure from the start, optimized for every workload, packaged for many consumption models, ready to scale, and easy to manage.
- Back to Blog
- Newer Article
- Older Article
- bcady on: Staying ahead of security threats
- Diana Schmidt on: HPE InfoSight for Servers expands across the portf...
- David Roman on: Just announced: HPE OneView 5.2. What’s new? Plent...
- shazebict on: How virtual server security and compliance procedu...
- Steven Johnson on: Achieve a global view into your IT Infrastructure ...
- jet web solutions on: How to find just right IT solutions for small busi...
- Jay 123548132 on: What's New with HPE OneView 5.0?
- Rajesh Vasudev on: What are RAID levels, and which are best for you?
- James Diaz on: What’s New with HPE OneView? Bring more composabil...
- ComputeExperts on: HPE InfoSight: Playing in a league of its own and ...
Hewlett Packard Enterprise International
- Communities
- HPE Blogs and Forum
© Copyright 2022 Hewlett Packard Enterprise Development LP