{"id":3880,"date":"2020-10-15T07:46:40","date_gmt":"2020-10-15T12:46:40","guid":{"rendered":"https:\/\/www.stratospherenetworks.com\/blog\/?p=3880"},"modified":"2020-09-30T11:59:14","modified_gmt":"2020-09-30T16:59:14","slug":"why-you-need-to-pay-attention-to-iot-security-right-now","status":"publish","type":"post","link":"https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-pay-attention-to-iot-security-right-now\/","title":{"rendered":"Why You Need to Pay Attention to IoT Security Right Now"},"content":{"rendered":"<p><img decoding=\"async\" class=\"alignleft size-medium wp-image-3881\" src=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/09\/IoT-security-concept-300x200.jpg\" alt=\"A person holds a tablet against a green, leafy, blurred background with the initials IoT superimposed over the scene, along with symbols like a shield to represent IoT security.\" width=\"300\" height=\"200\" srcset=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/09\/IoT-security-concept-300x200.jpg 300w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/09\/IoT-security-concept-1024x683.jpg 1024w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/09\/IoT-security-concept-768x512.jpg 768w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/09\/IoT-security-concept-1536x1024.jpg 1536w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/09\/IoT-security-concept-2048x1365.jpg 2048w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/09\/IoT-security-concept-200x133.jpg 200w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>They can do everything from monitoring vital signs in hospital rooms to watching doorways for visitors and intruders. They&#8217;re capable of tracking the temperature and vibration levels inside trucks transporting food, as well as ensuring restaurant freezers function properly.\u00a0<a class=\"external-link\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/the-internet-of-things-and-security-what-a-business-needs-to-know\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Internet of Things (IoT) devices<\/a>\u00a0are everywhere these days, and their usefulness is on the rise as organizations around the world aim to stay productive while maintaining social distance, according to the EHS Today article &#8220;<a class=\"external-link external external_icon\" href=\"https:\/\/www.ehstoday.com\/safety-technology\/article\/21130849\/how-iot-is-helping-businesses-adapt-to-pandemicrelated-disruption#:~:text=Over%20days%20and%20weeks%2C%20the,to%20compare%20productivity%20among%20shifts.&amp;text=In%20a%20pandemic%20where%20every,can%20make%20a%20significant%20difference.\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">How IoT is Helping Businesses Adapt to Pandemic-Related Disruption<\/a>.&#8221;<\/p>\n<p>The number of internet-connected &#8220;smart&#8221; devices present in our homes and offices has skyrocketed in recent years, particularly as many businesses have embraced this new type of tech as part of their\u00a0<a class=\"external-link\" href=\"https:\/\/www.stratospherenetworks.com\/digital-transformation-advisory-services.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">digital transformation efforts<\/a>. Last year,\u00a0<a class=\"external-link external external_icon\" href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2019-08-29-gartner-says-5-8-billion-enterprise-and-automotive-io\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Gartner estimated<\/a>\u00a0that the automotive and enterprise IoT market would reach 5.8 billion endpoints worldwide in 2020.<\/p>\n<p>The current crisis has also created opportunities to put these gadgets to good use: A recent study titled &#8220;<a class=\"external-link external external_icon\" href=\"https:\/\/www.ncbi.nlm.nih.gov\/pmc\/articles\/PMC7198990\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Internet of things (IoT) applications to fight against COVID-19 pandemic<\/a>&#8221; contains a long list of applications for these devices, from smart contact tracing to rapid screening via internet-connected medical devices.<\/p>\n<p>However, despite all the ways in which they can potentially streamline healthcare and otherwise improve our lives, IoT devices have at least one significant downside: They create new points of vulnerability that malicious actors can exploit to infiltrate private networks and gain access to sensitive data. As a result, it&#8217;s crucial for CISOs and other security leaders to pay close attention to IoT-related risks right now, especially if their organizations have transitioned some or all of their staff members to <a class=\"external-link\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/remote-work-resource-roundup-9-blog-entries-for-business-leaders-navigating-the-new-normal\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">remote work arrangements<\/a>.<\/p>\n<h2>What the Shift to Remote Work Means for IoT Security<\/h2>\n<p>Even before this year&#8217;s mass move to working from home, hackers had already\u00a0<a class=\"external-link\" href=\"https:\/\/www.stratospherenetworks.com\/are-your-iot-and-mobile-devices-safe-from-malware.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">honed in on IoT devices<\/a>\u00a0as attractive targets. They&#8217;re generally easier to hack since most organizations already have plenty of safeguards in place for older forms of technology like laptops and desktops. As a result, cybercrime focused on IoT devices was already exploding in recent years:\u00a0<a class=\"external-link external external_icon\" href=\"https:\/\/www.sonicwall.com\/resources\/white-papers\/2019-sonicwall-cyber-threat-report\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">SonicWall identified<\/a>\u00a032.7 million IoT attacks in 2018, a 215.7 percent increase from 10.3 million in 2017.<\/p>\n<p>Attackers often convert IoT devices into nodes for botnets, which the criminals then leverage to carry out Distributed Denial of Service (DDoS) attacks, mine cryptocurrency, or steal data, the\u00a0<a class=\"external-link external external_icon\" href=\"https:\/\/www.sophos.com\/en-us\/medialibrary\/PDFs\/technical-papers\/sophoslabs-2019-threat-report.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">SophosLabs 2019 Threat Report states<\/a>.<\/p>\n<p>Consumer smart devices in particular often have serious flaws like firmware vulnerabilities, flawed authentication schemes and improperly secured admin interfaces that leave them vulnerable to cyberattacks, according to the ZDNet article &#8220;<a class=\"external-link external external_icon\" href=\"https:\/\/www.zdnet.com\/article\/theres-a-growing-blind-spot-for-your-security-team-during-the-pandemic-iot-devices\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">There&#8217;s a growing blind spot for your security team during the pandemic: IoT devices<\/a>.&#8221;\u00a0Nearly all (98 percent) of IoT device traffic isn&#8217;t encrypted, and more than half (57 percent) of these devices are vulnerable to attacks of either medium or high-level severity, according to the\u00a0<a class=\"external-link external external_icon\" href=\"https:\/\/start.paloaltonetworks.com\/unit-42-iot-threat-report\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">2020 Unit 42 IoT Threat Report<\/a>\u00a0from Palo Alto Networks.<\/p>\n<p>Now, with many people performing their professional duties from home, consumer IoT devices share networks with corporate ones, propping open the door for hackers looking to infiltrate companies&#8217; networks, as the ZDNet article states. Consequently, IoT-focused incidents proliferated in the first half of this year, with 20.2 million attacks\u00a0<a class=\"external-link external external_icon\" href=\"https:\/\/www.sonicwall.com\/2020-cyber-threat-report\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">identified by SonicWall<\/a>, a 50 percent year-over-year increase.<\/p>\n<h2>How to Protect Your Network and Data<\/h2>\n<p>To keep your data breach risk level as low as possible, it&#8217;s imperative that you take steps to <a class=\"external-link\" href=\"https:\/\/www.stratospherenetworks.com\/managed-cybersecurity-services.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">proactively combat cyberattacks<\/a> that target potentially vulnerable IoT devices. Some solutions that can help address the issue of IoT security include the following:<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Network and endpoint\u00a0<a class=\"external-link\" href=\"https:\/\/www.stratospherenetworks.com\/managed-detection-and-response.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Managed Detection and Response (MDR)<\/a>, which helps you proactively identify and address threats as quickly as possible.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Employee security awareness training, including specific information about IoT devices. For instance, you can potentially instruct them on how to segment home networks to keep IoT devices and corporate devices separate, according to ZDNet.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><a class=\"external-link\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/covid-19-and-zero-trust-architecture-why-this-framework-makes-more-sense-than-ever-post-pandemic\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Zero-trust network architecture<\/a>\u00a0with a Secure Access Service Edge (SASE), which ensures remote users only have access to the specific resources and apps they need to do their jobs. We provide this via our\u00a0<a class=\"external-link\" href=\"https:\/\/www.stratospherenetworks.com\/office-anywhere.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Office Anywhere solution<\/a>.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>Ultimately, we must all remain vigilant as cybercriminals\u00a0<a class=\"external-link\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-keep-your-data-safe-from-coronavirus-related-cybercrime\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">look for ways to catch us off guard<\/a> as we continue to adapt to the &#8220;new normal&#8221; created by the continuing public health crisis. If you have any questions about the best ways to tackle IoT security risks, our team of experienced security analysts would be happy to assist you. Just give us a call at 877-599-3999 or email <a class=\"external-link\" href=\"mailto:sales@stratospherenetworks.com.\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">sales@stratospherenetworks.com.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>They can do everything from monitoring vital signs in hospital rooms to watching doorways for visitors and intruders. They&#8217;re capable of tracking the temperature and vibration levels inside trucks transporting food, as well as ensuring restaurant freezers function properly.\u00a0Internet of &hellip; <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-pay-attention-to-iot-security-right-now\/\">Read more <span class=\"meta-nav\">><\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":3881,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[263],"tags":[],"class_list":["post-3880","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-corner"],"yoast_head":"<title>The Importance of IoT Security in 2020: Why CISOs Need to Pay Attention<\/title>\n<meta name=\"description\" content=\"Consumer Internet of Things devices on the same networks as corporate devices can lead to data breaches. Read on to learn more about IoT security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-pay-attention-to-iot-security-right-now\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Importance of IoT Security in 2020: Why CISOs Need to Pay Attention\" \/>\n<meta property=\"og:description\" content=\"Consumer Internet of Things devices on the same networks as corporate devices can lead to data breaches. Read on to learn more about IoT security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-pay-attention-to-iot-security-right-now\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-15T12:46:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/09\/IoT-security-concept.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2121\" \/>\n\t<meta property=\"og:image:height\" content=\"1414\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kevin Rubin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kevin Rubin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-pay-attention-to-iot-security-right-now\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-pay-attention-to-iot-security-right-now\/\"},\"author\":{\"name\":\"Kevin Rubin\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\"},\"headline\":\"Why You Need to Pay Attention to IoT Security Right Now\",\"datePublished\":\"2020-10-15T12:46:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-pay-attention-to-iot-security-right-now\/\"},\"wordCount\":739,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-pay-attention-to-iot-security-right-now\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/09\/IoT-security-concept.jpg\",\"articleSection\":[\"Cyber Corner\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-pay-attention-to-iot-security-right-now\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-pay-attention-to-iot-security-right-now\/\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-pay-attention-to-iot-security-right-now\/\",\"name\":\"The Importance of IoT Security in 2020: Why CISOs Need to Pay Attention\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-pay-attention-to-iot-security-right-now\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-pay-attention-to-iot-security-right-now\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/09\/IoT-security-concept.jpg\",\"datePublished\":\"2020-10-15T12:46:40+00:00\",\"author\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\"},\"description\":\"Consumer Internet of Things devices on the same networks as corporate devices can lead to data breaches. Read on to learn more about IoT security.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-pay-attention-to-iot-security-right-now\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-pay-attention-to-iot-security-right-now\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-pay-attention-to-iot-security-right-now\/#primaryimage\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/09\/IoT-security-concept.jpg\",\"contentUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/09\/IoT-security-concept.jpg\",\"width\":2121,\"height\":1414,\"caption\":\"A person holds a tablet against a green, leafy, blurred background with the initials IoT superimposed over the scene, along with symbols like a shield to represent IoT security.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-pay-attention-to-iot-security-right-now\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stratospherenetworks.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why You Need to Pay Attention to IoT Security Right Now\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/\",\"name\":\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\",\"description\":\"The Stratosphere Networks IT Support blog offering IT Support Services information.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\",\"name\":\"Kevin Rubin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g\",\"caption\":\"Kevin Rubin\"},\"sameAs\":[\"http:\/\/stratospherenetworks.com\/\"],\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/author\/kevin-rubin\/\"}]}<\/script>","yoast_head_json":{"title":"The Importance of IoT Security in 2020: Why CISOs Need to Pay Attention","description":"Consumer Internet of Things devices on the same networks as corporate devices can lead to data breaches. Read on to learn more about IoT security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-pay-attention-to-iot-security-right-now\/","og_locale":"en_US","og_type":"article","og_title":"The Importance of IoT Security in 2020: Why CISOs Need to Pay Attention","og_description":"Consumer Internet of Things devices on the same networks as corporate devices can lead to data breaches. Read on to learn more about IoT security.","og_url":"https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-pay-attention-to-iot-security-right-now\/","og_site_name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","article_published_time":"2020-10-15T12:46:40+00:00","og_image":[{"width":2121,"height":1414,"url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/09\/IoT-security-concept.jpg","type":"image\/jpeg"}],"author":"Kevin Rubin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kevin Rubin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-pay-attention-to-iot-security-right-now\/#article","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-pay-attention-to-iot-security-right-now\/"},"author":{"name":"Kevin Rubin","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5"},"headline":"Why You Need to Pay Attention to IoT Security Right Now","datePublished":"2020-10-15T12:46:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-pay-attention-to-iot-security-right-now\/"},"wordCount":739,"commentCount":0,"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-pay-attention-to-iot-security-right-now\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/09\/IoT-security-concept.jpg","articleSection":["Cyber Corner"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-pay-attention-to-iot-security-right-now\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-pay-attention-to-iot-security-right-now\/","url":"https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-pay-attention-to-iot-security-right-now\/","name":"The Importance of IoT Security in 2020: Why CISOs Need to Pay Attention","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-pay-attention-to-iot-security-right-now\/#primaryimage"},"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-pay-attention-to-iot-security-right-now\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/09\/IoT-security-concept.jpg","datePublished":"2020-10-15T12:46:40+00:00","author":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5"},"description":"Consumer Internet of Things devices on the same networks as corporate devices can lead to data breaches. Read on to learn more about IoT security.","breadcrumb":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-pay-attention-to-iot-security-right-now\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-pay-attention-to-iot-security-right-now\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-pay-attention-to-iot-security-right-now\/#primaryimage","url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/09\/IoT-security-concept.jpg","contentUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/09\/IoT-security-concept.jpg","width":2121,"height":1414,"caption":"A person holds a tablet against a green, leafy, blurred background with the initials IoT superimposed over the scene, along with symbols like a shield to represent IoT security."},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratospherenetworks.com\/blog\/why-you-need-to-pay-attention-to-iot-security-right-now\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratospherenetworks.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Why You Need to Pay Attention to IoT Security Right Now"}]},{"@type":"WebSite","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website","url":"https:\/\/www.stratospherenetworks.com\/blog\/","name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","description":"The Stratosphere Networks IT Support blog offering IT Support Services information.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5","name":"Kevin Rubin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g","caption":"Kevin Rubin"},"sameAs":["http:\/\/stratospherenetworks.com\/"],"url":"https:\/\/www.stratospherenetworks.com\/blog\/author\/kevin-rubin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/3880","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=3880"}],"version-history":[{"count":2,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/3880\/revisions"}],"predecessor-version":[{"id":3883,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/3880\/revisions\/3883"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media\/3881"}],"wp:attachment":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=3880"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=3880"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=3880"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}