{"id":295,"date":"2023-09-25T01:57:00","date_gmt":"2023-09-25T01:57:00","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/binamarc\/?p=295"},"modified":"2023-09-25T01:57:00","modified_gmt":"2023-09-25T01:57:00","slug":"what-are-the-biggest-iot-security-risks-and-challenges","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/binamarc\/2023\/09\/25\/what-are-the-biggest-iot-security-risks-and-challenges\/","title":{"rendered":"What are the biggest IoT security risks and challenges?"},"content":{"rendered":"\n<p>After extensive research, some of our biggest IoT challenges are distributed denial of service (DDoS) attacks, users working remotely, and default passwords. DDos attacks is an attempt&nbsp;to forcefully slow down or crash a server. Many companies experience these brute force attacks, losing billions of dollars due to the breach of their systems. Users who work remotely usually have a different level of security at home for their systems compared to the organization that they&#8217;re working for, leaving them more susceptible to attacks. Lastly, many users, when creating accounts, are given generic passwords that are weak. Many users don&#8217;t bother changing the password they receive, which leaves them more vulnerable to their accounts&nbsp;being hacked.<\/p>\n\n\n\n<p>Sources:<\/p>\n\n\n\n<p><a href=\"https:\/\/usa.kaspersky.com\/resource-center\/preemptive-safety\/best-practices-for-iot-security\" target=\"_blank\" rel=\"noreferrer noopener\">Internet of Things security challenges and best practices | Tips for Securing IoT&nbsp;(kaspersky.com)Links to an external site.<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.kaspersky.com\/resource-center\/preemptive-safety\/how-does-ddos-attack-work\" target=\"_blank\" rel=\"noreferrer noopener\">Distributed Denial of Service: How DDoS Attacks Work (kaspersky.com)Links to an external site.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>After extensive research, some of our biggest IoT challenges are distributed denial of service (DDoS) attacks, users working remotely, and default passwords. DDos attacks is an attempt&nbsp;to forcefully slow down or crash a server. Many companies experience these brute force attacks, losing billions of dollars due to the breach of their systems. Users who work&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/binamarc\/2023\/09\/25\/what-are-the-biggest-iot-security-risks-and-challenges\/\">Read More<\/a><\/div>\n","protected":false},"author":27618,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/binamarc\/wp-json\/wp\/v2\/posts\/295"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/binamarc\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/binamarc\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/binamarc\/wp-json\/wp\/v2\/users\/27618"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/binamarc\/wp-json\/wp\/v2\/comments?post=295"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/binamarc\/wp-json\/wp\/v2\/posts\/295\/revisions"}],"predecessor-version":[{"id":296,"href":"https:\/\/sites.wp.odu.edu\/binamarc\/wp-json\/wp\/v2\/posts\/295\/revisions\/296"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/binamarc\/wp-json\/wp\/v2\/media?parent=295"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/binamarc\/wp-json\/wp\/v2\/categories?post=295"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/binamarc\/wp-json\/wp\/v2\/tags?post=295"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}