How do the Cyber-Criminals do it? How can they continue? They attack through the theft of personal data, the use of ransomware, denial of service, rerouting of traffic, malware to shut down central infrastructure and many more tactics and threats.
Neil Bosworth
Neil Bosworth, Head of Vertical Segments and IoT Products at Telit Cinterion speaks with Don Witt of The Channel Daily News, a TR publication, about cyber threats and how they gain access. For example, early IoT devices were made to perform a certain function without regard to security providing easy physical access. Cyber-criminal access can also be made when IoT software or hardware is out of date and if there is insufficient protection for data when data is at rest or in transit.
Listen in as Neil provides details to access methods and how Telit Cinterion stops them.
They help their customers and partners who require best-in-class Internet of Things (IoT) performance. Their engineering practices and design methodologies exceed stringent environmental requirements and industry standards. Their IoT experts have pioneered an end-to-end system approach to ensure everything works together when connecting devices. They enable businesses to manage IoT devices, connectivity, and everything in between.
They were established in 1986 as Telital, an engineering company providing research and development services for multinational telecoms. They emerged as cellular technology innovator. They began manufacturing and marketing products under the Telit brand in 1997.
They recognized the potential of cellular M2M and IoT solutions. They launched their first M2M module in 1998. The company has been a pioneer in enterprise-grade IoT products and software for over 20 years.
For more information, go to: https://www.telit.com/