Technical Support: 412-349-6678 | Incident Response

Tag: IoT

Worker looking at his IT asset list

Why Does Your IT Asset List Matter So Much?

IT security exists to protect your assets. But, is your full IT asset list truly taken into consideration? Although CFOs expertly track every large purchase and ensure each is inventoried annually, that list usually fails to provide the full IT asset list your team must protect. While some assets may...
Botnets - what are botnets and how to counter them - Ideal Integrations

What Are Botnets and How to Address Them

Botnet hackers obtain access to computers, servers, and/or IoT devices, then install software to perform command and control (C2) functions. These infected devices become slave devices, or robots, for the hacker who uses them to form a network (roBOT + NETwork = BOTNET). Historically, botnets used a client-server model to control the...
Internet of Things Devices

Exploring the Internet of Things

Lately, when Internet of Things (IoT) security shows up in the news, warnings about overly connected Christmas toys or the hacking of an unfortunate consumer’s NEST home system make the headlines. These stories are based on the consumer level. However, the IoT can be just as prevalent, and much more...