article thumbnail

The internet of trusted things

Dataconomy

IoT protocols 101: The essential guide to choosing the right option Types of security risks in IoT devices The following are some of the security risks associated with IoT devices: Weak authentication and authorization mechanisms: Many IoT devices use weak or default passwords, making them easy targets for cyber-attacks.

article thumbnail

How Can CIOs Teach Their Employees About Cybersecurity?

The Accidental Successful CIO

However, no matter how many firewalls we put in place or how effectively we implement two-factor authentication we still need to understand the weakest link in our security system: our employees. In a now classic experiment, in 2015 a security company dropped 200 USB sticks in airports and coffee shops around the U.S.

Training 113
article thumbnail

Security requires long haul planning

Cloud Musings

We also extract data from the Sonicwall firewall on who is accessing what type of data from where. The security analytic engine would flag that as being an unusual occurrence and Cloud Access Manager would interpret the higher risk score as a cue for stepping up authentication requirements. Jackson 2015 ) Follow me at [link].