Blog | G5 Cyber Security

How to respond to device and software backdoors inserted or left by vendors

IHS forecasts an influx of 30.7 billion IoT devices by 2020 and 75.4 billion by 2025. Viant backdoors will flood the enterprise, multiplying the risks of these kinds of security holes. CSO looks at vendor backdoors, how they get into products, the challenges to finding these, mitigating the easily infected openings, and responding to this hardware, software, and IoT-based dilemma. Backdoors can be found by hackers or vendors unwittingly or purposely leave backdoors inside their products.”]

Source: https://www.csoonline.com/article/3184663/how-to-respond-to-device-and-software-backdoors-inserted-or-left-by-vendors.html

Exit mobile version