Because the Internet of Things is now integral to critical infrastructure, business and home environments—from hospitals’ infusion pumps and routers to refrigerators that can tell you when you’re out of milk—potentially disastrous cybersecurity implications must be addressed.
Standard operating procedure within the embedded computing industry makes security more of an add-on or an afterthought that relies on “security by obscurity.” But this can have dire consequences for data security, as malicious actors can easily reverse engineer unsigned firmware to give them complete remote control of a device. And far too often, lateral movement is allowed, meaning hackers can pivot inside a targeted system until they find what they’re looking for.
Register or login for access to this item and much more
All Health Data Management content is archived after seven days.
Community members receive:
- All recent and archived articles
- Conference offers and updates
- A full menu of enewsletter options
- Web seminars, white papers, ebooks
Already have an account? Log In
Don't have an account? Register for Free Unlimited Access