article thumbnail

IoT Devices a Huge Risk to Enterprises

eSecurity Planet

When millions of people around the world were sent home to work at the onset of the global COVD-19 pandemic, they left behind not only empty offices but also a host of Internet of Things (IoT) devices – from smartwatches to networked printers – that were still connected to corporate networks and cranking away.

IoT 145
article thumbnail

Key Cybersecurity Trends for 2024: My Predictions

Jane Frankland

The proliferation of IoT devices and sensors will accelerate, allowing organisations to collect and leverage data for improved operational efficiency and real-time monitoring. IOT attacks aren’t showing any signs of slowing. As IoT continues to expand, cybercriminals will exploit vulnerabilities in IoT devices to carry out attacks.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

WEF Outlines Path to Cyber Resilience for Manufacturing Sector

SecureWorld News

The risk is too great, and key business partnerships are required," said Amy Bogac , former CISO at The Clorox Company. "If Safety is always the number one priority in manufacturing organizations," said Tammy Klotz , CISO at Trinseo. It warns that by 2030, damages from cyberattacks on manufacturing could total $1.5 Air Force (Ret.);

article thumbnail

Camera tricks: Privacy concerns raised after massive surveillance cam breach

SC Magazine

.” “It would be possible, on detailed examination of video, to compromise elements of operational security,” agreed Mike Hamilton, co-founder and chief information security officer of CI Security and former Seattle CISO. Thought leaders advise reducing or eliminating the use of these skeleton key-like accounts.

article thumbnail

SHARED INTEL: Here’s why CEOs who’ve quit Tweeting are very smart to do so

The Last Watchdog

Related: How ‘credential stuffing’ enables online fraud As a result, some CEOs admit they’ve stopped Tweeting and deleted their LinkedIn and other social media accounts – anything to help reduce their organization’s exposure to cyber criminals. That’s the ‘cheat code’ for CISO success. Corporate inertia still looms large.

CISO 185
article thumbnail

Cybersecurity Risks of 5G – And How to Control Them

eSecurity Planet

Exposing the Internet of Things (IoT) Universe. Consumer electronics, business, network appliances, and industrial IoT (IIoT) devices are all driving the exponential growth of IoT systems. Consumer electronics, business, network appliances, and industrial IoT (IIoT) devices are all driving the exponential growth of IoT systems.

Risk 136
article thumbnail

BlackBerry Discloses Vulnerability After Months of Hiding

SecureWorld News

This is a decision that CISOs and executives must make with their bottom line in mind, and it's never an easy choice. Andrew King, CISO at BreachQuest, discusses the difficult decision BlackBerry faced: "The head-in-the-sand approach continues to come back to bite companies. Should it try to quietly mitigate the situation?