We asked security experts how they protect IoT devices and networks. Here’s what they learned about defending connected systems against threats.
- Comprehensive Approach for Securing IoT Devices
- Implement Robust Authentication and Network Isolation
- Isolate IoT Devices and Update Passwords
- Secure Network and Regularly Update Firmware
- Innovative Approaches for IoT Security
- Layered Approach for Government IoT Security
- Behavior-Based Firewalls for IoT Protection
7 Unique Challenges of Securing the IoT
Comprehensive Approach for Securing IoT Devices
Securing Internet of Things (IoT) devices presents unique challenges due to their diverse applications, limited processing power, and widespread connectivity. At our organization, we address these challenges through a comprehensive approach emphasizing network segmentation, regular monitoring, and device-specific security protocols.
Unique Considerations in Securing IoT Devices:
- Diversity of Devices – IoT devices, ranging from industrial sensors to smart home systems, have varying hardware, software, and protocols. This diversity complicates standardization and increases the attack surface, requiring tailored security measures.
- Limited Processing Power – Many IoT devices lack computational resources for advanced security features. Off-device solutions, such as securing data transmissions and enforcing network policies, are essential.
- Continuous Connectivity – IoT devices are often connected 24/7, making them vulnerable to attacks like Distributed Denial of Service (DDoS) or unauthorized access, requiring robust monitoring and proactive defenses.
How We Secure IoT Devices:
- Network Segmentation – We isolate IoT devices on dedicated network segments to limit their access to critical systems, reducing exposure to risks. For instance, industrial sensors are restricted to specific communication paths.
- Regular Firmware Updates – Many IoT vulnerabilities stem from outdated firmware. We enforce policies for regular updates and ensure patches are promptly applied.
- Device Authentication – All IoT devices are authenticated before connecting to the network using unique credentials and certificates to ensure only authorized devices gain access.
- Real-Time Monitoring and Alerts – Using tools with real-time visibility, we monitor IoT traffic for anomalies, enabling quick responses to threats.
- Encryption and Secure Communication – Data between IoT devices and systems is encrypted to prevent interception, with secure protocols like TLS being standard.
When securing IoT-enabled environmental sensors, we segmented their network, enforced authentication, and monitored traffic. This setup prevented unauthorized access that could have disrupted operations.
Securing IoT devices requires a proactive, multi-layered approach tailored to their unique challenges. By focusing on network segmentation, device authentication, and monitoring, we ensure our IoT ecosystem remains resilient against evolving threats.
Adrian Ghira
Managing Partner & CEO, GAM Tech
Implement Robust Authentication and Network Isolation
IoT devices are vulnerable to massive attacks due to multiple network entry points. Securing IoT devices is challenging because of the diverse device ecosystem. Many IoT devices come with limited computational power, restricting the use of strong security mechanisms. I found ensuring security from production to decommissioning is a daunting task. As a health tech expert, I suggest these practices to secure Internet of Things devices.
Implement a robust authentication process. Replace the default password with a strong one and use multi-factor authentication. Create secure and automated processes for patching and updating firmware. I assert on isolating IoT devices on a separate network. Trust me, it will minimize the potential attack surfaces. The limited computational power of IoT devices can be addressed by securing data at rest and in transit using lightweight cryptographic protocols. I would suggest conducting regular security audits, including vulnerability assessment and penetration testing.
However, there are some unique considerations crucial in IoT security. IoT devices are often deployed in public and outdoor setups. They can quickly be tampered. Securing data is important, but it must not interfere with device performance or real-time operations. IoT devices usually come into use for years, and manufacturers stop providing security updates after the initial years. Also, I found devices from different vendors require adherence to security standards like IoT SAFE or ISA/IEC 62443. These devices often collect sensitive data. I suggest ensuring compliance with regulations like GDPR, HIPAA, or CCPA.
John Russo
VP of Healthcare Technology Solutions, OSP Labs
Isolate IoT Devices and Update Passwords
Given IoT devices are notoriously insecure and infrequently patched, they should be kept on a network isolated from other corporate IT assets. IoT devices often ship with weak security settings, such as a default administrator password, that should be updated immediately on deployment. To detect abuse of IoT devices, network flow logging should be enabled and the logs centrally recorded, so that anomalous network connections can be detected.
Vaughan Shanks
CEO, Cydarm
Secure Network and Regularly Update Firmware
Securing IoT devices can be tricky because they often have limited processing power and may not have strong built-in security features. One approach I take is to ensure that all devices are connected through a secure network with strong encryption. For example, using a virtual private network (VPN) for IoT devices adds an extra layer of security, preventing unauthorized access.
Another consideration is regularly updating device firmware to patch any vulnerabilities, and setting up strong, unique passwords for each device. It’s also important to monitor device activity to catch any unusual behavior early. In our case, we use a centralized system that tracks all IoT device connections, so if anything seems off, we can address it quickly. Balancing ease of use and security is key to keeping IoT devices safe without compromising performance.
Adnan Jiwani
Assistant Manager Digital Marketing, Ivacy VPN
Innovative Approaches for IoT Security
Securing IoT devices presents a unique and fascinating set of challenges. Beyond traditional cybersecurity concerns like malware and hacking, we grapple with resource constraints, limited processing power, and often minimal memory on these devices. This necessitates innovative approaches, such as lightweight cryptography, secure boot mechanisms, and over-the-air updates for firmware and security patches.
Moreover, the sheer volume and diversity of IoT devices—from smartwatches to industrial sensors—demand flexible and scalable security solutions. Addressing these complexities requires a deep understanding of embedded systems, networking protocols, and the evolving threat landscape, making it a constantly evolving and intellectually stimulating domain.
Aleksey Pshenichniy
Chief R&D Officer, Elai.io
Layered Approach for Government IoT Security
As government agencies increasingly adopt Internet of Things technologies to improve citizen services and operational efficiency, securing these devices has become a major priority—and challenge. When you’re talking about sensors, smart city infrastructure, connected vehicles and more, the attack surface is vast. And with the public sector already lagging in technology adoption, many agencies are playing catch-up on IoT security.
From my experience partnering with government IT leaders, what’s critical is taking a comprehensive, layered approach to IoT security. It’s not just about hardening individual devices—though that’s certainly important. Agencies need to look at everything from network segmentation and encryption to access control and monitoring. They also have to factor in the unique constraints of IoT, like limited device compute power and the need for scalable, automated security.
A great example is smart traffic sensors. Cities are deploying them to optimize traffic flow and improve safety. But unsecured, those same sensors could be a conduit for attackers to access broader city networks. So the transportation departments we work with are investing in end-to-end security, from tamper-proof device design to real-time threat monitoring. They’re also collaborating closely with vendors and security researchers to stay ahead of emerging risks.
Now, I’ll caveat this by saying IoT security is a highly technical, rapidly evolving field—not my core expertise. But in general, my advice to agencies adopting IoT is: Prioritize security from the start, partner with experienced vendors, and never assume you’re done. Build in security at every layer, stay vigilant, and be ready to adapt as the threat landscape shifts. IoT has huge potential to transform governments—but only if agencies can keep citizen data and critical infrastructure safe.
Michael Hurwitz
President/Co-Founder, Careers in Government
Behavior-Based Firewalls for IoT Protection
I prefer to use behavior-based firewalls that learn typical IoT device behavior and block unusual traffic automatically. This approach protects against potential cyber-attacks and ensures that IoT devices are functioning optimally. According to a report by SecureFrame, in 2024, data breach costs averaged $4.88 million, a 10% rise from 2023, with 46% of breaches involving personal customer information like Social Security numbers, emails, phone numbers, and addresses. Cybercrime costs are expected to hit $10.5 trillion, growing 15% annually by 2025.
I advocate for regularly updating IoT device firmware and implementing strong passwords to prevent unauthorized access. Make sure to have a well-defined security policy in place specifically for IoT devices, including proper network segmentation and monitoring. One unique consideration is the potential impact of IoT device failures on business operations.
You see, any disruptions or malfunctions can significantly affect productivity and revenue as these devices become more integrated into daily operations. I recommend regularly updating and patching all IoT devices with the latest security protocols to prevent vulnerabilities from being exploited. This may involve creating a clear process for device updates and implementing strict policies regarding password usage and access control.
Max Avery
Chief Business Development Officer, Digital Family Office























