Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Thursday, 30 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Companies must counter DDoS attacks via webcams and routers with a strategic approach

by The Gurus
November 11, 2016
in This Week's Gurus
Share on FacebookShare on Twitter

After the biggest DDoS attack of all time was reported in late September, cyber-criminals wasted no time in mounting their next operation. Less than a month later, a further broad-based attack crashed major online services including Twitter, Spotify, Netflix and PayPal. As before, a large number of smart devices connected via the internet of things (IoT) were hijacked to mount the attack. They included everything from video recorders to home-based routers and manipulated webcams. These crimes are becoming more and more frequent, demonstrating that cyber-criminals have understood that the huge number of smart devices has the potential to cause major damage. After all, most connected devices are almost (or even completely) unprotected. This is why companies and individuals need to rethink the way they protect their devices. They need a strategic approach that starts from the internet itself – not the device.
A quick glance at the current situation shows that protecting connected objects looks like a Herculean task. In a rush to follow the trend towards digitalisation, more and more companies are internet-enabling their products. Yet this produces a challenge in that companies who until now have made their name producing coffee machines or fridges have suddenly become IT companies – and often they are not equipped for that. As a result, devices in today’s IoT market include a wide range of software and communication protocols. Rather than adhering to unified standards, device manufacturers are simply doing their own thing. Yet this makes it significantly more difficult to protect their devices efficiently.
A further problem is that most web-enabled objects are not designed to have security software installed on them. The manufacturers’ priority is often to get the smart device on the market as fast as possible and security is lower down the priority list – or not on it at all. The fact that these manufacturers are not used to dealing with IT in their devices makes everything more difficult. 
IoT protection from the cloud
As it is practically impossible to protect every device individually – from both the technical and economical viewpoint – it is clear that we need to take a higher-level approach to IoT security and see it as a strategic issue. The explosion in the number of web-enabled devices now makes it essential to centralise protection.
Cloud-based protection can be installed directly into the infrastructure in place at telcos as well as mobile and other service providers. This approach ensures that the threat cannot reach the device in the first place. There is no need for customers to install software and any smart device can be protected, even if it does not permit any software modifications. That stops cyber-criminals from infecting devices and also limits the damage by those that may already have been compromised – regardless of their type or the software and standards they use.
Using this approach, Secucloud is currently working with several large telcos and mobile providers – including T-Mobile in the Netherlands – to fight botnets and DDoS attacks. We have also recently started offering these firms an IoT anti-bot package that they can use to protect their customers’ smart devices from cyber-attacks.
Hackers planning a cyber-attack balance the cost against the benefit. If the cost of attacking a specific target is too high for the benefit they want, the target quickly becomes unattractive. By expanding cloud-based protection, cyber-criminals have fewer ways to attack and infect masses of IoT devices relatively quickly and easily. That, in turn, reduces the potential for broad-based DDoS attacks like those we have seen on IoT devices.

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Industry-first study quantifies security management impact on security-related risks and operational costs

Next Post

How banks can protect themselves from cyber hacks

Recent News

cybersecurity training

Only 10% of workers remember all their cyber security training

March 30, 2023
Pie Chart, Purple

New API Report Shows 400% Increase in Attackers

March 29, 2023
Cato Networks delivers first CASB for instant visibility and control of cloud application data risk

Cato Networks Recognised as Leader in Single-Vendor SASE Quadrant Analysis

March 29, 2023
Outside of cinema with advertising

Back and Bigger Than Ever! The Inside Man Season 5 Takes a Stab at Power Hungry Adversaries

March 29, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information