Menu

IoT FEATURE NEWS

Experian Offers 12 IoT Security Tips

By

Experian is a leading global information services company and is now offering fraud prevention strategies to businesses and consumers looking to manage risk and increase security when using the IoT.

“The Internet of Things is only as strong as its weakest link, and it is important to fully understand what an interconnected environment means,” said Adam Fingersh, SVP and GM, fraud and identity business, Experian. “Opening products and services to the Internet dramatically increases the opportunities for cybercriminals, who can hack those products to get into your broader systems.”

As more “things” get connected, the usual laissez faire attitude to security just won’t cut it anymore. Recognizing that, Experian has issued the following 12 tips for consumers and business looking to stay safe.

Consumers

  1. Ensure that the products and services being purchased and connected are from reputable companies.
  2. Ensure that the providers of these products and services have clear privacy and data-usage policies.
  3. Be aware that data from any smart device may make its way to third parties for a variety of purposes and that there are not always standard policies across providers.
  4.  Make sure that any access to these systems is always closely guarded.
  5.  Be aware of the applications installed on devices and download applications only from reputable providers, such as the iTunes App Store or Google Play, rather than gray-market app platforms. Also, only download apps created by trusted entities.

Businesses

  1. Access to systems should require more than just credentials. Leverage cyber intelligence and complex device-recognition solutions to prevent unauthorized access.
  2.  Designate who has access to systems and clarify why they need it. It is also important to understand the normal behavior of who is logging into these systems, so that when anomalies occur, immediate preventative action can be taken.
  3.  Clearly outline roles and responsibilities in terms of access monitoring. This can be segmented by factors such as channel or line of business.
  4.  Share intelligence across the consumer and enterprise side of your business.
  5. Partner with providers that have been successfully solving the account takeover problem. The concerns and vulnerabilities of Account Takeover problems in the digital realm using fit-for-purpose technologies are similar to the concerns and vulnerabilities in the Internet of Things world.
  6. Apply robust privacy policies and practices. Doing so will ensure that the data being collected is actually required for the services offered and that data-collection practices are easily understood by the consumer.
  7. Treat any collected data as highly sensitive information. It is important to note that even seemingly uninteresting data can be used by fraudsters to build robust and accurate stolen identities, which can be used for online impersonation, social engineering, phishing attacks and more.


Edited by Peter Bernstein
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

Editorial Director

SHARE THIS ARTICLE
Related Articles

Rising Edge Computing Investments to Reach $350B by 2027, According to IDC

By: Alex Passett    3/27/2024

Worldwide spending on edge computing is expected to surge (and then keep going) for the foreseeable future, according to the International Data Corpor…

Read More

ZEDEDA Adds Lisa Edwards as New Board Member, Seeks Opportunities to Strengthen Operations and Scale

By: Alex Passett    3/26/2024

Earlier this morning, ZEDEDA announced the addition of Lisa Edwards to its board of directors.

Read More

An Existing IoT Collab, Emboldened: Digi International and Telit Cinterion Transform Solutions with 5G RedCap Integration

By: Alex Passett    3/25/2024

The ongoing industry collaboration between Digi International and Telit Cinterion signals strong support for the mainstream showcasing of 5G for IoT a…

Read More

Telit Cinterion's 5G LGA Modules, Powered by Snapdragon from Qualcomm, to Create a Big Leap in IoT Connectivity

By: Alex Passett    3/25/2024

Telit Cinterion recently unveiled its FE990B34/40 LGA family of modules, powered by the Snapdragon X72 5G Modem-RF System from Qualcomm Technologies, …

Read More

Embracing Innovation in Mining: The Role of Network-Aware Applications in the Digital Transformation

By: Special Guest    3/21/2024

Shabodi leverages private 5G network capabilities and enables the development of network-aware applications to enhance operational efficiency, automat…

Read More