The increasing sophistication of ransomware groups and other cyber attackers has prompted Otorio’s researchers to recommend that OT network administrators prioritize security protocols. They should disable any unused cloud feature if they’re not actively using the router for cloud management to prevent device takeovers and reduce the attack surface. They also should register devices under their own accounts in the cloud platform before connecting them to the internet, and limit direct access to the routers from IIoT devices since built-in security features like VPN tunnels and firewalls are ineffective once compromised. Vendors, in addition to avoiding the use of weak identifiers should enforce initial credential setup so network operators avoid using default credentials and thus exposing the network to immediate security risks.
The security requirements of the IIoT are unique and should be considered separately to the IoT footprint, the researchers warned, adding that companies need to reduce “high-risk” features upon demand and add extra layers of authentication, encryption, access control, and monitor. For businesses that rely on IIoT devices, the report underscores the importance of taking a proactive approach to cybersecurity initiatives, particularly as hackers continue to create even more sophisticated threats.
<< photo by samer daboul >>
You might want to read !
- Exploring Qilin Ransomware’s Revenue Model: Affiliates Rake in Bulk of Ransom Payouts
- Cyolo: Revolutionizing Remote Access with Streamlined Security Measures
- Cobalt Strike Goes Golang: Hackers Targeting Apple macOS Systems
- The Rise of Crosspoint Capital: A Glimpse into the Absolute Software Acquisition
- “Uncovering the Teltonika Vulnerabilities That Put Industrial Organizations at Risk of Remote Attacks”
- PharMerica’s Major Breach Raises Concerns Over Healthcare Data Security
- “Federal Employees’ Data Compromised in Potentially Massive Transportation Department Breach”