NEW June Blog: Fortinet Offers Blanket Protection Against WannaCryCheck out our NEW June Blog!
Check out highlights from the 2017 HPE Discover Conference in Las Vegas!
Check out the highlights, sessions, and on demand content from the 2017 HPE Discover Conference in Las Vegas!
May Blog: Microsoft Gets Serious about EducationCheck our latest blog!
April Blog - Great Security Tools from Microsoft
Learn how HPE is inventing the future of computing at HPE Discover, June 5-8
Accelerating your outcomes from Digital Transformation - HPE is focused on helping enterprises accelerate their digital transformation with their expertise in helping enterprises architect, deploy and optimize your technology environments and IT strategies. HPE expertise spans business and IT strategy, helping transform IT to deliver real-time services and drive business outcomes.
Learn more about HPEDiscover
Join our team!integraONE is looking for Help Desk Technicians in our Harrisburg, Horsham, and Pittsburgh offices. Find out more
9 Ways to make IoT devices more secure
Devices must be more secure if IoT is to reach its full potential. The good news is that security policies and procedures can protect enterprise infrastructure, harden IoT configurations, and make the network smarter and more defensible. Here's where to start.
New devices are being plugged into the Internet of Things (IoT) at a rapid pace. While IoT is expected to offer many benefits, adding insecure devices to an enterprise network can have serious consequences. The good news is that security policies and procedures can protect enterprise infrastructure, harden IoT configurations, and make the network smarter and more defensible.
Research indicates that most systems are not compromised through sophisticated or device-specific vulnerabilities, but rather because of a lack of basic security controls. While at-risk devices have some things in common—they use TCP/IP protocols and Internet-based software—they cover a wide spectrum of price, application, and purpose. The category includes typical IT gear such as smartphones, tablets, sensor equipment, and control systems, as well as video cameras, network printers, industrial controls, and medical equipment.
Just how big of a problem is it? According to a recent poll by 451 Research, security is the No. 1 impediment of IoT—and for good reason. Weak links in an enterprise’s security posture from insecure devices are broad-ranging and difficult to pin down. For example, supply chains have many vulnerabilities and attack surfaces. There are also many protocols and standards to support, minimal over-the-network software security, complex security architectures, malware-riddled devices, and few incentive for vendors to develop and deploy device updates after the initial sale. Not to mention, just finding and cataloging every device is nearly impossible.
If IoT is to reach its full potential—and if enterprises are to benefit—devices must be more secure. The recommendations below are from various sources, including the Broadband Internet Technical Advisory Group (BITAG) and the Cloud Security Alliance. Some of the advice can be implemented today, but other recommendations will take time, especially around product design improvement.
1. Secure and centralize the access logs of IoT devices
Preventing devices from connecting to the network without IT’s knowledge is one of the first lines of defense. IT managers maintain centralized access logs of networks under their control. They know what’s attached to the network and who logs in to what, when, and for how long. Unfortunately, the process hasn’t scaled to address the volume of IoT devices coming online, which has enabled hackers to enslave insecure devices into botnets to launch distributed denial-of-service (DDoS) attacks. The consequences can be considerable. Thousands of vulnerable routers, IP cameras, and digital video recorders became infected with the Mirai malware and were then used to take down major websites. Mirai spreads to vulnerable devices by continuously scanning the Internet for IoT systems that are protected by factory default or hard-coded usernames and passwords. Experts suggest that the malware can be wiped by rebooting the device, but constant scanning for vulnerable systems almost ensures devices are re-infected. Only changing the default password protects them from rapid re-infection. And in this instance, because few enterprises kept centralized access logs of vulnerable devices, IT security managers didn’t know they were compromised.
Bottom line: Centralize access logs, and train security teams to recognize attack and alert patterns that use IoT endpoints. DDoS attacks sourced from vulnerable IoT devices are expected to increase, meaning endpoint protection systems that can recognize such threats should become standard.
2. Use encrypted protocols to secure communications
Encryption practices of IoT devices are inferior and insecure. Few devices use encrypted communications as part of their initial configuration. Rather, most use ordinary web protocols that communicate across the Internet in plain text, which makes them easy targets for hackers observing network traffic to identify weaknesses. At the very least, all web traffic should be using HTTPS, transport layer security (TLS), Secure File Transfer Protocol (SFTP), DNS security extensions, and other secure protocols for communications with management stations and across the Internet. In addition, devices that connect to mobile apps or other remote gateways should use encrypted protocols as well as encrypt data stored on flash drives. One reason to encrypt data is to ensure that malware hasn’t infected the device.
Bottom line: Choose devices that employ encryption, and use it.
3. Create more effective and secure password policies
Most network infrastructure requires the administrator’s default password to be changed when first accessed. However, most devices, such as home routers, network printers, and sensors, lack strong authentication and access methods. The Mirai botnet was able to be constructed because the default settings of many digital video recorders and IP cameras were never changed. Moreover, the concept of using multifactor authentication—using a variety of mechanisms to log in besides a simple password, such as with an SMS code sent to a cell phone—is a rarity in the IoT world. In fact, some IoT devices don’t require any authentication. A user can navigate with a web browser to a particular IP address and control the device’s configuration and operation.
To demonstrate the possible insecurities, software engineer Leo Linsky wrote what he called an “anti-worm” worm that hacks into IoT devices using default credentials and then changes the passwords to something stronger. While this is just an academic proof of concept published on GitHub, it is worth reviewing.
Bottom line: Change default passwords to strong, unique ones, and use single sign-on tools to manage and limit access. Educate end users on best practices for home network routers and modems, especially if laptops and tablets move from home to office networks.
4. Implement restrictive network communications policies, and set up virtual LANs
It's important to understand the difference between restrictive network communications and permissive network communications. For example, there is a difference between a PC that shares all of its hard drive with everyone and a web server that restricts only a few authorized users to view its content. Unlike most restricted web servers, the assumption with IoT devices—such as temperature sensors—is that they are permissive. They can and should communicate with just about anyone and any device by default. This permissive communication is part of their design. Vendors want them to participate on networks and share their data with a variety of tools and software programs. Unfortunately, permissiveness is what makes these devices inherently insecure and vulnerable to all sorts of exploits. Instead, restrictive network communications, such as built-in firewall rules or more careful user or application authentication, should be implemented. Devices should not be reachable by standard TCP/IP ports such as Telnet or FTP, and users should not assume they operate behind enterprise firewalls that will prevent communications across the network or out to the Internet.
Bottom line: One way to provide better security is to isolate sensors and other permissive devices on a separate virtual LAN. This setup prevents a hacker from observing the totality of network traffic if one sensor is compromised, or using it to launch attacks across the entire enterprise.
5. Understand that device firmware can be insecure
Identifying how firmware on connected devices is updated is a priority. For example, look at the network-attached printers still running original factory-installed firmware versions. Unlike Windows or Mac endpoints, sensors and printers don’t have the ability to enable automatic updates, and device manufacturers aren’t forthcoming when it comes to updates.
Some firmware is easily compromised because updates can be applied without any user authentication. Firmware can also be riddled with vulnerabilities. A case in point: Security researchers at the Carnegie Mellon University Cylab downloaded close to 2,000 home router products’ firmware images and tested them. Some 43 percent were vulnerable to simple attacks, and many had back doors to make hacking easier. One bright spot in this area is Factom, a security software vendor that proposes to authenticate IoT devices to prevent spoofing and ensure data integrity by leveraging block chain technology. Others should follow its lead.
Bottom line: Purchase devices that have secure firmware update policies when possible. In addition, educate users on how to secure home routers.
6. Improve failover design
Devices should function when Internet connectivity is lost or disrupted. However, few IoT devices are designed to cope with failures such as Internet continuity or data disconnections. Failover design is especially important for IoT devices that involve user safety, such as door lock mechanisms, video monitoring, and environmental monitors and alarms. These devices should have manual overrides or special functions for disconnected operations.
Bottom line: IT should include failover design as part of the decision process. Vendors must step up and address the problem.
7. Design explicitly for privacy and security
Few IoT device vendors consider security a feature or incorporate it into the design lifecycle. As a result, most devices fail to offer privacy policies or incorporate privacy-by-design principles. (This is also true of many standard computer hardware and software vendors.) In addition, distinguishing between the roles of supplier, OEM, customer, and partner is getting harder, making enforcement of security best practices difficult. As a result, some devices might have inserted malware, outdated software, bugs, or other vulnerabilities due to lack of proper testing or quality controls.
Bottom line: Security and user privacy of the entire IoT supply chain need improvement. Vendors must design explicitly for privacy and security, especially when a device is sold with an accompanying online service contract that locks customers in for extended periods of time. Vendors should also provide obvious links to privacy policies from websites.
8. Create an industry-backed program for “Secure IoT Device” labeling
There is currently no industry standards program for IoT security. BITAG’s "Internet of Things (IoT) Security and Privacy Recommendations" report suggests, “An industry-backed set of best practices seems to be the most pragmatic means of balancing the innovation in IoT against the security challenges associated with the fluid nature of cybersecurity, and avoiding the checklist mentality that can occur with certification processes.” It goes on to list a collection of industry groups, such as the W3C, the U.S. Federal Trade Commission, and the Online Trust Alliance, that have stakes in the IoT industry. Unfortunately, none of these organizations focus primarily on IoT.
Bottom line: The IoT device industry should consider the creation of an industry-backed program under which a "Secure IoT Device" logo or notation could appear on IoT retail packaging, similar to how the Wi-Fi Alliance operates.
9. Create bug bounty programs and vulnerability reporting systems
Vendor support for IoT devices is limited, especially when flaws are discovered. IoT devices are often missing features such as power reset buttons or even on/off switches found in typical IT products. Manufacturers may skip these features to simplify the product and reduce cost, but doing so can make products vulnerable to remote control exploits. Unfortunately, companies have few places to turn to. Few IoT vendors have implemented the support programs that the enterprise world takes for granted, such as customer alerts when a device is no longer sold, links to prior versions, and contact information.
Bottom line: Vendors must create ways for companies and users to get answers, including bug bounty programs, vulnerability reporting systems, support contacts, and escalation procedures.
March 2017 Blog: Aruba Atmosphere 2017, Nashville, TN Recap Parts 1 and 2Check out our March Blog series
February 2017 Blog: Many Organizations Will Find HPE/Aruba Networks IAP Solution Just Right
When it comes to wireless solutions for small and medium size organizations, the analogy of Goldilocks and the Three Bears serves as a great analogy. In the adorable children’s story, Goldilocks samples one bed too hard, one too soft, one porridge too hot, one too cold, until she finds the offerings that are perfect for her.
Read full article
integraONE Acquires Quatro Systems, Inc. of Horsham, PA
2/16/2017, Allentown, PA: integraONE, the area’s leading technology provider, is pleased to announce its recent acquisition of Quatro Systems, Inc. of Horsham, PA. The resulting partnership with Quatro Systems enables integraONE to offer its broad spectrum of information technology solutions to an even wider range of clients, adding the Philadelphia metro region to its geographic service area.
This is the third acquisition by integraONE, which previously acquired Classic Networking, Inc. of Mechanicsburg, PA in 2010 and 7 Layer Solutions, Inc. of Saxonburg, PA in 2012.
The acquisition comes nearly twenty-seven years after integraONE’s inception. Founded June 1, 1990 as Integra Business Center, Inc. (dba integraONE), the company provides networking infrastructure, data center, server, and storage solutions, security technologies, cloud solutions, unified communications, and its own managed services solution, FusionONE. The company is a trusted technology partner for medium-size to enterprise level financial, commercial, educational, governmental, and healthcare organizations throughout the Mid-Atlantic region.
“integraONE is a company that continually evolves to offer the best technologies available to meet the unique needs of our clients. This acquisition allows us to further expand our geographic reach into the Philadelphia metro region and to offer a local physical presence for our clients at this new Horsham office. Quatro Systems’ staff and resources will be a great addition to the integraONE team and we are excited about this growth opportunity,” said Marty Andrefski, President, integraONE.
Established in 1989, Quatro Systems, Inc. Quatro Systems, Inc. is an established Managed Services Provider and Systems Integrator. For the past 28 years, Quatro has been a full service leader in providing technology solutions, strategy, consulting, and IT infrastructure support services to companies of all sizes from small/medium to large organizations in the Mid-Atlantic region.
“We are excited to join forces with integraONE and to offer our legacy clients an even greater array of technology solutions and products. integraONE is a well-respected company and we are proud to join their team,” said Jim Chebin, CEO, Quatro Systems, Inc.
“Combining our existing managed services skillset with integraONE’s extensive technical expertise and product offerings will be a win-win for our clients. We are pleased to join the integraONE organization and are excited about what the future holds,” said Mike Kazakevich, President, Quatro Systems, Inc.
Founded in 1990, integraONE provides clients throughout the Mid-Atlantic with a full range of technologies solutions around the following core competencies: Security Technologies, Network Infrastructure, Data Center/Server/Storage solutions, Cloud Services, Unified Communications, and FusionONE Managed Services. integraONE is headquartered in Allentown, PA with satellite offices near Harrisburg, Pittsburgh, and now Philadelphia, PA.
integraONE maintains strategic alliances with industry leading technology providers including HPE, HPE/Aruba, HP, Inc., Cisco and Cisco Meraki, FireEye, APC, Axis, Barracuda, Bradford, Brocade, Lenovo, Fortinet, Kaspersky, Lightspeed Systems, Microsoft, ForeScout, Trend Micro, Cylance, iBoss, Symantec/BlueCoat, StorageCraft, Veeam, Concerto and more.
News Article Index
NEW June Blog: Fortinet Offers Blanket Protection Against WannaCry ...
Check out highlights from the 2017 HPE Discover Conference in Las Vegas! ...
May Blog: Microsoft Gets Serious about Education ...
April Blog - Great Security Tools from Microsoft ...
Learn how HPE is inventing the future of computing at HPE Discover, June 5-8 ...
Join our team! ...
9 Ways to make IoT devices more secure ...
March 2017 Blog: Aruba Atmosphere 2017, Nashville, TN Recap Parts 1 and 2 ...
February 2017 Blog: Many Organizations Will Find HPE/Aruba Networks IAP Solution Just Right ...
integraONE Acquires Quatro Systems, Inc. of Horsham, PA ...