APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    Ten Tips to Reduce IoT Networking and Security Risks

    As the number of IoT devices rise into enterprise networks, it is essential to interpret and comprehend their requirements and how they differ from other IT gear.  

    Ten Tips to Reduce IoT Networking and Security Risks

    By

    Apac CIOOutlook | Thursday, January 01, 1970

    Stay ahead of the industry with exclusive feature stories on the top companies, expert insights and the latest news delivered straight to your inbox. Subscribe today.

    Internet of things has more number of devices than there are people on the globe. As the number of IoT devices rise into enterprise networks, it is essential to interpret and comprehend their requirements and how they differ from other IT gear. 

    The significant difference between IoT devices and IT gear is that IoT devices are designed with little to no thought to security. This inability results in low memory and compute power to support security. The reason behind this is that they are explicitly designed for time-to-market and price and features.

    IoT devices gather a lot of data via a varied set of communication protocols. So, an enterprise must be proficient in supporting the means these devices use to transfer the data they gather. Interoperability is compromisable because these devices are built around a small set of recent to no set of standards. Vendors and service providers are working relentlessly to fix IoT networking and security issues, but in the meantime, it is essential for networking pros to face these challenges while integrating IoT and improvise according to them.

    Check Out: Top Networking Companies

    Ten tips to reduce IoT security risks:

    1) Passwords are the key to security. So, every password on every device should be updated from the default. An unchangeable default password device shouldn’t be used at all. Devices would function optimally with minimal permission.

    2) Minutely research everything that is being fed into the system. Be it cloud services that work with it or associated back-end.

    3) Discard the unnecessary features. For example, if a smart TV is used for only display, then it’s wise to deactivate its microphone and even its connectivity.  

    4) A separate network behind the firewall and careful monitoring keeps the insecure devices away from core networks and resources.

    5) Find devices with a hardware factory reset switch, open port or default password. These devices are vulnerable and should be eliminated.

    6) Tools that automatically connect to open Wi-Fi networks should be avoided.

    7) If the incoming traffic to the IoT devices is out of the organization's control, then ensure that open software ports are avoided so that a hacker or a miscreant can’t control them.

    8) If the IoT devices can send or receive data using encryption, then the data is much safer.

    9) Avoid using pieces of equipment that can’t get updates. If they get updated, ensure that they are getting patches for enhanced security.

    10) Avoid using products that aren’t supported by their manufacturers or cannot be secured by any means.

    More in News

    AI's Role in Apac's Digital Transformation Journey

    AI's Role in Apac's Digital Transformation Journey

    Salesforce Services in APAC: Empowering Digital Transformation Across the Region

    Salesforce Services in APAC: Empowering Digital Transformation Across the Region

    Enhancing Customer Satisfaction through Omni-Channel Payments

    Enhancing Customer Satisfaction through Omni-Channel Payments

    Impact of Blockchain on Supply Chain Innovation

    Impact of Blockchain on Supply Chain Innovation

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://www.apacciooutlook.com/news/ten-tips-to-reduce-iot-networking-and-security-risks-nwid-5759.html