• CERTIFICATE
    • Eminent VARs of India
    • Best OEM 2023
  • SYNDICATION
    • AMD
    • DELL TECHNOLOGIES
    • HITACHI
    • LOGMEIN
    • MICROSOFT
    • RIVERBED
    • STORAGECRAFT
    • THALES
  • EVENTS
  • GO DIGITAL
  • INFOGRAPHICS
  • PRESS
    • Press Release PR News Wire
    • Press Release Business Wire
    • GlobeNewsWire
  • SPECIAL
    • WHITE PAPER
    • TECHNOMANIA
    • SME
    • SMART CITY
    • SERVICES
    • EDITOR SPEAK
    • CSR INITIATIVES
    • CHANNEL GURU
    • CHANNEL CHIEF
    • CASE STUDY
  • TECHTREND
    • VAR PANCHAYAT
    • TELECOM
    • SOFTWARE
    • POWER
    • PERIPHERALS
    • NETWORKING
    • LTE
    • CHANNEL BUZZ
    • ASK AN EXPERT
  • SUBSCRIBE
  • Apps
  • Gaming
  • KDS
  • Security
  • Telecom
  • WFH
  • Subscriber to Newsletter
  • April Issue
  • Blogs
  • Vlogs
  • Faceoff AI
    

HOME
NEWS

An FBI Alert – The Dangers of Unpatched and Outdated IoT Devices


By VARINDIA - 2022-11-02
An FBI Alert – The Dangers of Unpatched and Outdated IoT Devices

By Harish Kumar, Head, Enterprise, Check Point Software Technologies, India & SAARC What Happened?

 

The FBI recently issued an industry notification around unpatched and outdated devices, warning the public that cyber criminals are increasingly targeting internet-connected devices for the purpose of exploiting their vulnerabilities.

 

The FBI discovered multiple vulnerabilities, specifically in medical devices, through devices that run outdated software and devices lacking sufficient security features.

 

According to FBI documentation, “these vulnerabilities negatively impact organization’s operational functions, overall safety, data confidentiality, and data integrity. In Medical, device vulnerabilities are inherent to the device itself, originating from device hardware design and device software management. Routine challenges include the use of standardized configurations, specialized configurations, including a substantial number of managed devices on the network, lack of device embedded security features, and the inability to upgrade those features.”1

 

Such potential attacks should be taken seriously especially here in India, where on average, an organization in India is being attacked 1742 times per week in the last 6 months, compared to 1167 attacks per organization globally. According to Statistica, in 2019, there were approximately 250 million internet of things (IoT) connected devices in India and this number was expected to reach over two billion by 2021, which heightens the possibility of more IoT devices being breached here in India.

 

Is There a Real Threat to Businesses?

 

The quick answer is “YES”. Every device that connects to the network through the Internet increases the cyber-attack surface. Protecting IoT devices against vulnerabilities (like that of which the FBI warns) is not a simple task, and there are various reasons for these difficulties. Here are a few reasons why this technology poses a greater security risk:

 

IoT devices are not designed with security top of mind (they’re usually unattended and unmanaged).

 

Up to half of connected devices, like ultrasound and MRI machines, run on legacy operating systems that are no longer supported or maintained—meaning zero security support or patches are available.

 

There’s no certification and standardization for cyber security in medical devices – which is ironic considering that medical device safety is one of the strictest areas of regulation gloabally.

 

There is a hodgepodge of devices within the organization, making it almost impossible to manually identify and map every single device to try and monitor its communication destinations.

 

IoT devices lack standardized interfaces and controls, so it’s also very difficult to create a uniform security policy, upgrade software, or even implement strong passwords without a solution specifically designed for IoT security.

 

The cost of a cybercriminal exploiting these vulnerabilities leaves a huge impact, both in the areas of financial loss and safety for employees, customers, patients, etc. According to a recent study by Ponemon, systems are paying $250,000 to $500,000 in any single ransomware attack on average2. This number does not include fees lost to exposing patient information.

 

How Can Check Point Help with the FBI Recommendations?

 

Managing the sheer number and variety of IoT devices can be overwhelming. And of course, your organization is probably using a wide range of those devices, from IP cameras and smart TVs to MRI machines and infusion pumps (if in healthcare).

 

The FBI released recommendations to consider while attempting to secure against these vulnerabilities. In this section, I will outline how Check Point is positioned to help mitigate these risks.

 

Endpoint ProtectionFBI Recommendation:

 

If supported by the medical device, use antivirus software on an endpoint. If not supported, providing integrity verification whenever the device is disconnected for service and before it is reconnected to the IT network.

 

Encrypt medical device data while in transit and at rest.

 

Utilize endpoint detection and response (EDR) and Extended Detection and Response (XDR) solutions, which provides visibility on medical devices and offers protection.

 

Check Point Solutions:

 

Horizon EDR/XDR: Horizon XDR/XPR enables rapid detection, investigation, and automated response across your entire IT infrastructure, including network, cloud, endpoint, mobile, and email security.

 

Check Point on-device security solutions:

 

Horizon Endpoint: a complete endpoint security solution built to protect user PCs and laptops from exploits, malware and ransomware.

 

Horizon Mobile: secures employee iOS and Android mobile devices across all attack vectors: apps, network and OS.

 

Quantum IoT Protect Embedded: secures IoT devices with on-device runtime protection.

 

Identify and Access ManagementFBI Recommendation:

 

Ensure default passwords are changed to secure and complex passwords specific for each medical device. If supported by medical device, limit the number of login attempts per user.

 

Check Point network security solutions:

 

Quantum Next Generation Firewalls: apply zero-trust policy to limit access based on need with IPS enabled to detect and prevent brute-force login attempts.

 

Asset ManagementFBI Recommendation:

 

Maintain an electronic inventory management system for all medical devices and associated software, including vendor-developed software components, operating systems, version and model numbers.

 

Use inventory results to identify critical medical devices, operational properties, and maintenance timeframes.

 

Consider replacement options for affected medical devices as part of purchasing process; if replacing the medical device is not feasible, take other mitigation precautions, such as isolating the device from network or auditing the device’s network activities.

Check Point solution

 

Quantum IoT Protect: Medigate (learn more) and Armis (learn more) are considered the most advanced asset management solutions in the market. Connect Medigate or Armis to Check Point to ingest 100,000+ device profiles and automatically create least-privileged access policies based on device attributes.

 

Vulnerability ManagementFBI Recommendation:

 

Work with manufacturers to help mitigate vulnerabilities on operational medical devices.

 

Monitor and review medical devices’ software vulnerabilities disclosures by vendors and conduct independent vulnerability assessments.

 

Implement a routine vulnerability scan before installing any new medical device onto the operating IT network.

 

Check Point

Quantum IoT Protect with Medigate or Armis AVM (Asset Vulnerabilities Management) solution.

 

Quantum Next Generation Firewalls: enable IPS to prevent network-based exploits of vulnerable medical devices that cannot be patched.

 

If you would like more information, head over to the hyperlinks included in the section above and/or reach out to us now.

Check Point’s Quantum IoT Protect is designed to protect all of your organization’s connected devices. Quantum IoT Protect provides:

 

IoT Discovery and Risk Analysis. Check Point's Quantum IoT Protect can identify, classify, and analyze IoT devices, providing identity details such as device type, vendor, model operating system, and OS version. It assesses the risk level that the device poses in the network based on indicators such as known vulnerabilities and connection types. Check Point offers two options for IoT discovery that fit any business case. Enterprise IoT discovery embedded right into Quantum Security Gateways for quick and efficient discovery of many enterprise devices including printers, smart TVs, IP phones. In addition, provide the ability to leverage integrated industry-specialized advanced discovery engines for healthcare and industrial.

 

Autonomous IoT Zero-Trust Network Access. The solution enables you to protect IoT devices against unauthorized internet access and communication, minimizing the attack surface with zero-trust policies that utilize device attributes and risk profiles. It also allows for real-time enforcement to prevent IoT devices from compromising other assets or attempting communication with malicious sites.

 

IoT Threat Prevention. The solution can block known and zero-day attacks with virtual patching and real-time IoT threat intelligence leveraging Check Point’s ThreatCloud – ensuring accurate prevention using a combination of the latest AI technologies with big data threat intelligence shared between 100 million endpoints, gateways and IoT devices worldwide.

 

Unified Policy Events and Management. Quantum IoT Protect is now integrated with Check Point Infinity security management architecture, making it simple for customers to define unified access control policies and investigate threats through a single console. With cloud assist, you can autonomously monitor IoT logs/data using behavior-based AI & ML; which automatically updates the on-premises security management IoT access control and threat prevention policies.

 

And with Quantum IoT Protect, you can accomplish all of this through a single simple interface, without having to grapple with a vast range of IoT devices, hardware, and software.

 

Discover how Check Point can help you achieve a safe and secure IoT environment for your healthcare organization and learn more best practices you can implement to improve cyber security for healthcare IoT.

 

 

See What’s Next in Tech With the Fast Forward Newsletter

SECURITY
View All
Zscaler announces AI innovations to its Data Protection Platform
Technology

Zscaler announces AI innovations to its Data Protection Platform

by VARINDIA 2024-05-20
SHIELD to enhance Swiggy’s fraud prevention and detection capabilities
Technology

SHIELD to enhance Swiggy’s fraud prevention and detection capabilities

by VARINDIA 2024-05-20
Axis Communications announces its first thermometric camera designed for Zone/Division 2
Technology

Axis Communications announces its first thermometric camera designed for Zone/Division 2

by VARINDIA 2024-05-20
SOFTWARE
View All
Hitachi Vantara and Veeam announce Global Strategic Alliance
Technology

Hitachi Vantara and Veeam announce Global Strategic Alliance

by VARINDIA 2024-05-16
Adobe launches Acrobat AI Assistant for the Enterprise
Technology

Adobe launches Acrobat AI Assistant for the Enterprise

by VARINDIA 2024-05-11
Oracle Database 23ai offers the power of AI to Enterprise Data and Applications
Technology

Oracle Database 23ai offers the power of AI to Enterprise Data and Applications

by VARINDIA 2024-05-10
START - UP
View All
Data Subject Access Request is an integrated module within ID-REDACT®
Technology

Data Subject Access Request is an integrated module within ID-REDACT®

by VARINDIA 2024-04-30
SiMa.ai Secures $70M Funds from Maverick Capital
Technology

SiMa.ai Secures $70M Funds from Maverick Capital

by VARINDIA 2024-04-05
Sarvam AI collaborates with Microsoft to bring its Indic voice LLM to Azure
Technology

Sarvam AI collaborates with Microsoft to bring its Indic voice LLM to Azure

by VARINDIA 2024-02-08

Tweets From @varindiamag

Nothing to see here - yet

When they Tweet, their Tweets will show up here.

CIO - SPEAK
Automation has the potential to greatly improve efficiency and production

Automation has the potential to greatly improve efficiency and production

by VARINDIA
Various approaches are followed to enhance efficiency, productivity, and cost-effectiveness

Various approaches are followed to enhance efficiency, productivity, and cost-effectiveness

by VARINDIA
Technology can be leveraged in several ways to boost efficiency, productivity and reduce cost

Technology can be leveraged in several ways to boost efficiency, productivity and reduce cost

by VARINDIA
Start-Up and Unicorn Ecosystem
GoDaddy harnesses AI power for new domain name recommendations

GoDaddy harnesses AI power for new domain name recommendations

by VARINDIA
UAE’s du Telecom selects STL as a strategic fibre partner

UAE’s du Telecom selects STL as a strategic fibre partner

by VARINDIA
JLR and Dassault Systèmes extend partnership for All Vehicle Programs worldwide

JLR and Dassault Systèmes extend partnership for All Vehicle Programs worldwide

by VARINDIA
Rapyder partners with AWS to accelerate Generative AI led innovation

Rapyder partners with AWS to accelerate Generative AI led innovation

by VARINDIA
ManageEngine integrates its SIEM solution with Constella Intelligence

ManageEngine integrates its SIEM solution with Constella Intelligence

by VARINDIA
Elastic replaces traditional SIEM game with AI-driven security analytics

Elastic replaces traditional SIEM game with AI-driven security analytics

by VARINDIA
Infosys and ServiceNow to transform customer experiences with generative AI-powered solutions

Infosys and ServiceNow to transform customer experiences with generative AI-powered solutions

by VARINDIA
Crayon Software Experts India inaugurates its ISV Incubation Center in Kolkata

Crayon Software Experts India inaugurates its ISV Incubation Center in Kolkata

by VARINDIA
Dassault Systèmes to accelerate EV charging infrastructure development in India

Dassault Systèmes to accelerate EV charging infrastructure development in India

by VARINDIA
Tech Mahindra and Atento to deliver GenAI powered business transformation services

Tech Mahindra and Atento to deliver GenAI powered business transformation services

by VARINDIA
×

Reproduction in whole or in part in any form or medium without express written permission of Kalinga Digital Media Pvt. Ltd. is prohibited.

  • Distributors & VADs
  • Industry Associations
  • Telco's in India
  • Indian Global Leaders
  • Edit Calendar
  • About Us
  • Advertise Us
  • Contact Us
  • Disclaimer
  • Privacy Statement
  • Sitemap

Copyright varindia.com @1999-2024 - All rights reserved.