Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Partner Perspectives  Connecting marketers to our tech communities.
12/5/2016
01:55 PM
Jonathan Anderson
Jonathan Anderson
Partner Perspectives
50%
50%

Protect Your Company From Hackable Holiday Gifts

This holiday season promises to be full of devices, apps, and connectivity. Planning and executing appropriate security precautions now will save your business from a serious breach later.

Every year new toys, games, and devices come out with increasing levels of Internet connectivity. Some of these lack fundamental security precautions and end up on the Most Hackable Holiday Gifts list. After the holidays, some of these devices will end up in the office, used by employees for their work as part of your BYOD policy, or brought in to share, show off, and play with. In addition to providing entertainment for the office, they also present risks to your data and systems.

The vast majority of people start using their new devices soon after they open them. However, fewer than half follow appropriate security measures such as changing default configurations and passwords, installing critical updates, or adding security software. Here’s a look at this year’s most hackable holiday gifts.

Bring Your Own Device

Laptops, tablets, and smartphones top the list of this year’s hackable gifts, and more than 50% of consumers surveyed by Intel Security plan to purchase at least one of these devices. While readily hackable in their default form, most organizations are well protected against threats from these devices, blocking them from the corporate network or quarantining them on an isolated network segment unless they meet the corporate security standard.

Media Players

Media players and streaming sticks are becoming popular and will likely make it into the office as people use them to stream music, watch TV shows, or use them to easily connect their devices to corporate monitors. Employees will connect them to the office Wi-Fi network, not realizing the potential risk of an unsecured device or the vulnerabilities of older, unpatched software. Again, blocking access to unauthorized devices or restricting them to an isolated network segment is the best defense.

Home Automation

Controlling things around the house, from thermostats to door locks, is another growing market that may not show up on your risk assessment. However, these devices are connected to the Internet through home routers and may provide attackers with a path into your company when employees work from home. Hackers and security researchers have already demonstrated that they can compromise some of these devices. In addition, employees will be checking on their smart home devices from the office, frequently visiting third-party websites and using smartphone apps with uncertain security profiles. Completely blocking access to these tools will likely cause a backlash from employees. Web gateways, data loss prevention, and network traffic analysis will be necessary to detect and prevent breaches, data exfiltration, or credential theft from compromised home automation sites.

Drones

Whether used for fun or for business, you can pretty much guarantee that a drone will be passing through your business in the next 12 months. Wireless connectivity, smartphone apps, and even the onboard software all present potential threats to your information security. Again, blocking access to unauthorized devices or restricting them to an isolated network segment is the best defense. However, if your employees are using these devices for business purposes such as promotional videos or aerial photos, they may end up connected to the core network. Additional precautions then become necessary, including ensuring software versions are up to date, changing default passwords, and installing appropriate security controls.

This holiday season promises to be full of devices, apps, and connectivity. Planning and executing appropriate security precautions now will save your business from a serious breach or cyberattack later and still allow your employees to enjoy their new toys. Learn more about the McAfee Most Hackable Holiday Gifts list and follow us @IntelSecurity

Jonathan Anderson is responsible for technical strategy and integrating security into future IoT solutions at Intel Security. Prior to joining Intel, he served 14 years across both Cisco and HP where he continuously interlocked with customers, sales force, and product teams ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/25/2020
9 Tips to Prepare for the Future of Cloud & Network Security
Kelly Sheridan, Staff Editor, Dark Reading,  9/28/2020
Malware Attacks Declined But Became More Evasive in Q2
Jai Vijayan, Contributing Writer,  9/24/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15216
PUBLISHED: 2020-09-29
In goxmldsig (XML Digital Signatures implemented in pure Go) before version 1.1.0, with a carefully crafted XML file, an attacker can completely bypass signature validation and pass off an altered file as a signed one. A patch is available, all users of goxmldsig should upgrade to at least revisio...
CVE-2020-4607
PUBLISHED: 2020-09-29
IBM Security Secret Server (IBM Security Verify Privilege Vault Remote 1.2 ) could allow a local user to bypass security restrictions due to improper input validation. IBM X-Force ID: 184884.
CVE-2020-24565
PUBLISHED: 2020-09-29
An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the ...
CVE-2020-25770
PUBLISHED: 2020-09-29
An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the ...
CVE-2020-25771
PUBLISHED: 2020-09-29
An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the ...