Lab top manager Andrey Pozhogin

manager Andrey The problem is that to be effective, security teams ne IT to be willing to collaborate. After talking to Malone, I decid to talk to the guys setting up the security companies’ booths at SpiceWorld and ask them for their thoughts on how the two functions could work together.

Kaspersky believes that companies have generally realiz manager Andrey

that IT and security departments vanuatu email list 10097 contact leads at enterprises must work together due to the nature of the threats their companies face. As an example, he cit the increasingly tough fight against ransomware, which has l IT professionals to realize that without the help of security specialists, they will not be able to prevent ransomware attacks or recover from them if they actually happen.

However, disagreements still occasionally arise between

IT and security experts when one side of the equation forgets that its actions affect the other. A great illustration of this phenomenon comes from a story told by Kevin Coffey, senior director of business development at Censornet. He says he encounter a company that had been the victim of a data breach in which hackers were able to collect vast amounts of data from the company’s trading statistics.

That happen, says Coffey, because the company install a new soft drink vending machine. Because the machine had a crit card reader and automatic ordering of missing products, it was connect to the company’s internal network. And no one thought about the fact that the soda machine, like most IoT devices, lack any security.

After discovering that someone was stealing

Data from the company, the security team found that the data was first copi from the company’s servers to a device inside adb directory the drink machine, after which the hackers were able to transfer the data to their own servers.

This happen because no one code these widgets yourself or with consult with each other when connecting the machine to the network, and it never occurr to anyone that it ne to be install outside the company’s firewall, separate from the corporate network. And, of course, no one monitor the data flow from this machine, because it was, after all, an ordinary drink vending machine.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top