Can your cell phone be used to steal your email password or fingerprint data? Can hackers access personal information from your heart rate monitor, fitness tracker or smartwatch? What may have once sounded like science fiction is rapidly becoming reality.
We now live in an era of connectivity – with digitally connected devices permeating every aspect of our lives. In fact, as soon as 2020, the number of connected devices will reach more than 21 billion. This level of interconnectedness is enabling people and businesses to do things never before imagined – from home automation to environmental monitoring.
Today’s increasingly connected world is also introducing more attack vectors and more possibilities for cyber crime. Unfortunately, some of the most commonly used interconnected devices contain vulnerabilities. At a recent DEF CON, 47 vulnerabilities affecting 23 connected items – including webcams, door locks, thermostats and baby monitors – were disclosed. With these vulnerabilities, cyber criminals now have more entry points and can move laterally across networks. As a result, cyber attacks can have far more extensive effects than ever before. Despite this information, 80 percent of organizations do not routinely test their IoT apps for security vulnerabilities.
Developing resilience to withstand cyber attacks is critical to future success. Safeguarding software and connected devices – and making it as difficult as possible for exploitation – will help to improve overall organization system security.
Organizations must be proactive and operate in a state of readiness. Embracing a holistic, risk-based strategy enables organizations to manage their risk awareness, security, detection, response and recovery. By focusing on mitigation options, continuous monitoring, diagnosis and remediation, companies are better able to protect themselves and proactively confront potential situations before they become an acute threat.
Read the full Motorola Solutions White Paper here to learn more about the emergence of new attack vectors and how a holistic strategy can help defend against emerging cyber threats.