A recent report highlights on high number of connected devices failing to comply with security regulations. Risk is not only about the likelihood of being attacked, but also considers impact factors such as business criticality. Therefore, the list of riskiest devices does not always perfectly align with the most attacked devices.
Organizations need a two-pronged approach to tackle the risks of non-compliant connected devices: understanding the inherent risk factors and gaining complete visibility. Many devices have outdated or poorly implemented security features, making them vulnerable to hacking. This could involve weak encryption, insecure default passwords, or lack of support for security updates.
Non-compliant rates in connected devices can indeed pose significant challenges. Compliance issues may arise due to various factors such as outdated software, lack of security protocols, or insufficient patching mechanisms. These non-compliant devices can become vulnerable to cyberattacks, potentially leading to data breaches, privacy violations, or even physical harm in critical infrastructure systems.
As per SafeShark, a company specializing in testing connected products, revealed that a whopping 74% of over 100 devices tested did not meet security requirements.This non-compliance violates the Product Security and Telecoms Infrastructure Act (PSTI).Companies failing to adhere to these regulations could face legal repercussions and reputational damage.
Industry experts are urging manufacturers, retailers, and distributors to prioritize compliance to ensure consumer safety and trust. The results show that three-quarters of these devices are still not compliant with the legal requirements set out in the Product Security and Telecoms Infrastructure Act.
Secondly, the most important is, there is need to hold device manufacturers accountable for ensuring compliance throughout the lifecycle of their products, including providing updates and support. Also need for Conducting risk assessments to identify and mitigate potential vulnerabilities in connected devices proactively.
Finally, by combining an understanding of risk factors with comprehensive visibility, organizations can effectively secure their attack surface and mitigate the risks posed by non-compliant connected devices.
See What’s Next in Tech With the Fast Forward Newsletter
Tweets From @varindiamag
Nothing to see here - yet
When they Tweet, their Tweets will show up here.