Prevent criminal hackers who target IoT to gather private data and guess passwords

DDoS attacks are hardly the only way attackers pit IoT against the enterprise. Cyber miscreants compromise IoT to unlock treasure troves of PII, which grants them ammunition to easily gather passwords for accounts at businesses, government agencies inside the military. Because many connected devices mean many passwords, criminal hackers also crack IoT at home and at work to cull countless device credentials. They test these passphrases on enterprise systems, assuming that people repeat the same word jumbles on every system they access.

read more

Prevent criminal hackers who target IoT to gather private data and guess passwords

DDoS attacks are hardly the only way attackers pit IoT against the enterprise. Cyber miscreants compromise IoT to unlock treasure troves of PII, which grants them ammunition to easily gather passwords for accounts at businesses, government agencies inside the military. Because many connected devices mean many passwords, criminal hackers also crack IoT at home and at work to cull countless device credentials. They test these passphrases on enterprise systems, assuming that people repeat the same word jumbles on every system they access.

read more