Threat of the month: Compromised embedded systems

Share this article:
What is it?
Embedded systems are small computing or logic devices that can connect to the internet. These are often deployed without network perimeter protection, such as a firewall. These devices are seldom patched, leaving them vulnerable to remote and local exploits.

How does it work?
The embedded systems are deployed with default configurations, so attackers can easily login and change critical systems, potentially causing real-world damage.

Should I be worried?
Embedded systems are usually treated with less security focus than workstations or servers, which is a huge mistake.

How can I prevent it?
I recommend placing devices behind network perimeter devices when possible. Default usernames and authentication credentials should also be changed. Another preventative measure is ensuring all embedded devices have up-to-date firmware/software.
Share this article:

Next Article in Features

Sign up to our newsletters

More in Features

Following the framework: Government standards

Following the framework: Government standards

New government standards promise to address risk and improve online security for critical infrastructure, reports Karen Epper Hoffman.

HIPAA shake: Health care

HIPAA shake: Health care

Adherence to HIPAA, the national law that aims to protect patient information, is about to get trickier, reports Alan Earls.

Affecting the C-suite: The CSO's reputation in today's corporate environment

Affecting the C-suite: The CSO's reputation in today's ...

Those who occupy the C-suite all bow to one corporate god: Reputation, says Blackstone CISO Jay Leek. James Hale reports.