IoT and IIoT
The IoT (Internet of Things) and the IIoT (Industrial Internet of Things) allow you to connect a multitude of devices, robots and machines to a network in order to significantly increase the profitability of your company and reduce its losses .
The IoT includes: smart homes and offices, mobile fitness devices and connected toys. It is therefore intended more for the general public.
IIoT, on the other hand , focuses on improving efficiency, safety and productivity in industrial and business settings. In short, the IIoT promises a profitable return on investment for businesses, industries and governments. Examples? Agriculture , smart cities and factories as well as smart grids.
The IIoT in turn includes M2M ( Machine to Machine), the aim of which is to improve communications between machines and even those between machines and objects, machines and infrastructure and machines and people. .
Through IoT and IIoT:
- rationalize and increase your production;
- increase the productivity of your employees;
- react quickly in the event of a problem;
- anticipate various problems or equipment breakage.
Industries that can benefit from IoT and IIoT
IoT
- Mining
- Coal / petroleum / natural gas extraction
- Wood cutting / forestry
- Agriculture
Etc.
- Distribution/transport
- Commerce de détail
- Commerce de détail alimentaire (épiceries)
- Santé
- Banques/services financiers
- Tourisme
- Restauration
Etc.
Depending on the size of the company, its importance and its turnover, the perpetrators of this type of cyberattack can demand ransoms ranging from a few thousand dollars ... to several hundred thousand dollars. Ransoms even exceed the million mark.
However, the losses incurred are not limited to the value of the ransom. By no longer having access to their data for a long period of time, companies and government authorities thus trapped see their activities diminish or come to a complete stop.
Striking examples
In June 2020, the University of California, San Francisco, resolved to pay a ransom of US $ 1.14 million to recover sensitive medical school data seized by hackers.
In 2017, WannaCry attacked more than 200,000 computers around the world. Multinationals, hospitals and governments were among the victims of this ransomware , which caused global losses estimated at several hundreds of millions of dollars.
When your system is held hostage, unfortunately, it will be difficult for you to find all your data on your own. Faced with this impasse, some decide to pay the ransom, but we do not recommend submitting to hackers' demands in this way, as there is no guarantee that they will give your data back to you once they get their money.
If you have been struck by ransomware, EcoSysIP can help you minimize its losses and prevent its spread: contact us now.
Ransomware does not discriminate: it attacks SMBs as well as large companies. However, hackers and government agencies remain popular with hackers because of their lucrative potential.
Ransomware often takes the form of an email with a clickable link or an attachment which, once opened, allows the perpetrator to take the data of his victim's network hostage: the perpetrator then demands a ransom in exchange. from which he "undertakes" to give the victim back access to his data.
With just one click, your entire business network can be taken hostage.
Test
To protect yourself from identity theft
With teleworking, multi-factor authentication has become a real necessity, whether remote connections go through terminal-server (TS), virtual private network (VPN) or even through an application hosted in the cloud.
Outsmart the clever foxes who would be tempted to pretend to be an employee: multi-factor authentication is the solution against identity theft by usernames and passwords.
What is Multi-Factor Authentication (MFA) and Two-Factor Authentication?
Multifactor authentication: A process for verifying identity that uses at least two different authentication factors.
Two-factor authentication: A method of verifying identity that uses precisely two different authentication factors.
The different authentication factors
In order to secure any connection or transaction of a user, the system will attempt to confirm their identity using various authentication factors.
The password
The password is information that the user must know .
The token (or identification token - security token)
The token can either be a real token that the user must have when logging in or his smartphone.
A common problem with authentication with a simple username and password is that these are often found in company databases, which can be decrypted by a hacker. So even if you change your passwords regularly, you are still at risk.
In addition, a significant number of employees use passwords that are too simple, and therefore easy to crack. Some even write their passwords on Post-It notes on their computer screens.
Compromised passwords are involved in 80% of security breaches, hence the importance of having a multi-factor authentication system. Advantages
Significant reduction in security breaches:
- Allows you to verify the identity of the user to avoid intrusions.
- Improves network security when employees connect to it remotely with their various devices.
- Strengthens the credibility of the company in the eyes of its customers, particularly for transactional sites. After all, trust has to be earned.
Time and cost savings:
- Reduces the number of requests sent to IT technicians. In fact, more than a third of the requests received by the IT departments of companies that have password-only authentication systems relate to… passwords. Resetting them requires time that technicians could use more productively.
Several major cyber attacks have taken place due to the absence of EDRs in computer security equipment, including that of the MGM hotel in Las Vegas in 2020 (personal information leaked by 10 million customers).
Companies that fall victim to such attacks pay a heavy price: financially, on the one hand, and in terms of their reputation. They risk taking years to regain public confidence.
One of the biggest weaknesses of a business is not in equipment, but in human error. Indeed, often inadvertently or through ignorance, employees will pave the way for attacks, in particular by clicking on a corrupted link, by opening a document that is equally corrupt or by disclosing information to hackers. EDR is the most effective solution to guard against such attacks.
Today, the complexity and evolution of IT infrastructures, applications, the cloud, virtual machines and endpoints increase the chances of being subjected to a cyberattack.
To secure these elements effectively, three aspects are required: a holistic view of the network, data collection and correlation between events and threats . This is what SIEM allows
What is a SIEM?
SIEM (for Security Information Management system or, in French, management of information and security events) has the role of detecting threats, attacks and anomalies thanks to its ability to correlate the various events. Thus, he can identify the cause of several separate events, such as a hacker having slipped into the network to perform manipulations or even an SMS or an email that would have been used to make phishing attempts.
Data collection and standardization
In order to be able to correlate events, SIEM collects them on logs and equipment, such as firewalls, routers, servers, databases, etc. These events are then normalized into a more readable format, allowing the IT team to search by criteria, for example.
The advantages of SIEM
Better network protection
SIEM also alerts you to suspicious activity on software and network connected devices - for example, it will alert you if a service provider installs software on your network that can potentially export data from your business.
Simplified network management
SIEM allows events to be archived as well as the generation and replay of old ones to conduct investigations after an incident.
Your company's compliance with legal requirements
After collecting the data, SIEM places it in a central repository for analysis and, ultimately, to produce compliance reports. Thus, SIEM speeds up the identification and analysis of security events.
We build networks made for IoT and IIoT
It is crucial to build networks that can support the immense amount of objects connected to them and that generate data all the time. Equally important is that this data is collected and interpreted in a way that gives you the information you need to make decisions (like replacing a faulty part in a robot). This is why we will offer you object hosting platforms bringing together the various services essential to the administration of your IoT network (data recording, location and identification) as well as easy-to-use applications.
We ensure network security
Objects connected to the network can be the gateway to a threat or a computer attack. The behavior of users and entities should be continuously monitored , especially if the objects collect sensitive data.
Our IoT and IIoT security solutions
- Next Generation Firewall (NGFW)
- EDR
- SIEM
- NAC
We design networks that communicate with each other
In a factory, for example, there are often two networks: one for its equipment and machinery, and the other for administration. To ensure smooth operations, it is important to unify these networks so that they communicate when necessary, without compromising the confidentiality of information.
Let us help you bridge the gap between your IoT networks and your security
Do you want to improve the performance of your connected objects and the security on your network?