The evolution of the internet started with the interconnection of computers which developed into the interconnection of people and has reached the point of interconnection of things or devices. The Internet of Things (IoT) has become the new trend and all manufacturers release new products which can be operated remotely and interconnected with a network of similar devices. According to Gartner, Inc.[1], it is expected that 20.8 billion devices will be connected to the IoT by 2020. The IoT offers numerous capabilities and not only is it targeted at industrial sectors (smart manufacturing, traffic management, fleet management, environmental monitoring), but has also managed to reach our homes (smart homes) and support critical services (remote health monitoring and emergency notification systems). Interconnected devices collect and exchange data between themselves and third-party service providers.

The use of IoT devices raises a number of security issues which derive from the fact that they usually process or transmit personal sensitive information and thus become an interesting target for attackers. However, these devices are not usually designed with data security and privacy in mind and most importantly they usually have limited capabilities in terms of energy consumption and processing power. Taking into account that these devices are usually operated at home by people who have no previous knowledge of security, it is obvious that the IoT is far from being protected by cyber-attacks.

Neurosoft offers a set of solutions and services, designed for the specific needs of IoT, in order to proactively manage vulnerabilities, monitor status and repel cyber security attacks.

Our experience focuses in the areas of:

  • Design and architecture requirements for interconnecting devices.
  • Vulnerability assessments and penetration testing.
  • Monitoring.
  • Compliance.
  • Security Hardening.

Our highly-qualified professional team of security analysts and researchers will:

  • Identify risks and vulnerabilities.
  • Assess risk exposure.
  • Develop protection and detection mechanisms.
  • Establish contingency plans.
  • Respond to cyber security incidents.
  • Provide guidance on IoT security hardening guides.
  • Audit compliance.

[1] “Gartner Says 6.4 Billion Connected “Things” Will Be in Use in 2016, Up 30 Percent From 2015″. Gartner,  10 November 2015. Retrieved 21 April 2016.