09/02/2021 | Press release | Distributed by Public on 09/02/2021 04:22
What to consider when it comes to the security of network-enabled devices
Responding correctly to an incident involving an IoT device
Let's be clear: the networking of devices increases the likelihood of hacker attacks. Therefore, an IoT security strategy is an absolute must for all companies that use such devices internally. When an incident occurs with an IoT device, the Product Security Incident Response Team (PSIRT) usually takes care of it.
It is important to react quickly if an incident does occur. With STORM powered by OTRS, the notification of an incident is immediately forwarded to a limited group of designated employees within a company, which can be the PSIRT or SOC team. Using predefined processes, all responsible employees are informed in a fraction of a second and appropriate steps are taken to minimize the damage.
An incident - whether successfully 'averted' or not - always reveals vulnerabilities in the system and, above all, in the IoT devices themselves. On the plus side, with every vulnerability disclosed, smart objects become increasingly secure against external attacks.
These IoT vulnerabilities and incidents must be managed and documented. This is why STORM was developed to securely handle security incidents and the resulting security-related tasks in the cybersecurity environment. Neither other employees in the company nor external persons have access to STORM data. Instead, the PSIRT takes care of further processing the security incident using the information contained in the ticket.
Whether working with a PSIRT or not, the best way to proceed in the event of an incident should be clearly defined in a company's security policy. Incident reporting and tracking software that meets security standards is helpful in this regard. And, with STORM, you have software and experienced security experts at your side to help you set up your incident management process and vulnerability management.
Don't get the increased risk from the IoT catch you off-guard. Examine your environment now: Establish your policies, procedures and processes before you are under attack.