While the burgeoning world of IoT has transformed the ways in which we live and work, the world of IoT has also caught the attention of cybercriminals. As IoT devices become increasingly more advanced, hackers have simultaneously become more sophisticated in their attacks, often targeting pre-existing security loopholes to gain access to company systems.
A Russian national was charged with one count of conspiracy for his role in a conspiracy to recruit a Tesla employee to introduce malicious software into Tesla's computer network, extract data from the network, and extort ransom money from Tesla.
New York Mayor Bill de Blasio, First Lady Chirlane McCray, and Schools Chancellor Richard A. Carranza announced “Bridge to School,” a Citywide initiative for the 2020-21 school year focused on the social and emotional well-being of students and adults in order to create a safe, supportive learning environment that confronts the trauma caused by the COVID-19 crisis. As a result, schools will be equipped to integrate trauma-informed practices into school reopening, and build off of last year’s major expansion of mental health supports in schools.
In part 1 of this series, we covered why Distributed Internet of Things devices are attractive and vulnerable targets for cyber criminals and hackers. Now we turn our attention to strategies for protecting these devices, which in turn, helps to protect your entire network.
Network administrators have long been stretched thin in their attempts to maintain global endpoint security settings, configurations and patching. Now that most, if not all, of their organization’s employees are connecting remotely, the job has become even more difficult.
Remote work is testing organizations, putting their IT departments under great stress. Like employees, many companies were unprepared for the many challenges of this seismic shift, one of which has been the dramatic changes in network and enterprise boundaries. Suddenly, securing endpoints became — and continues to be — a top concern.