{"id":1523,"date":"2024-09-09T08:12:58","date_gmt":"2024-09-09T13:12:58","guid":{"rendered":"https:\/\/blog.motorolasolutions.com\/en_us\/?p=1523"},"modified":"2024-09-09T08:12:58","modified_gmt":"2024-09-09T13:12:58","slug":"increasing-connectivity-exposes-new-cyber-attack-vectors","status":"publish","type":"post","link":"https:\/\/blog-test.motorolasolutions.com\/en_us\/increasing-connectivity-exposes-new-cyber-attack-vectors\/","title":{"rendered":"Increasing Connectivity Exposes New Cyber Attack Vectors"},"content":{"rendered":"<p>Can your cell phone be used to steal your email password or fingerprint data? Can hackers access personal information from your heart rate monitor, fitness tracker or smartwatch? What may have once sounded like science fiction is rapidly becoming reality.<\/p>\n<p>We now live in an era of connectivity \u2013 with digitally connected devices permeating every aspect of our lives. In fact, as soon as 2020, the number of connected devices will reach more than\u00a0<a href=\"https:\/\/www.gartner.com\/newsroom\/id\/3165317\" target=\"_blank\" rel=\"noopener\">21 billion<\/a>. This level of interconnectedness is enabling people and businesses to do things never before imagined \u2013 from home automation to environmental monitoring.<\/p>\n<p>Today\u2019s increasingly connected world is also introducing more attack vectors and more possibilities for cyber crime. Unfortunately, some of the most commonly used interconnected devices contain vulnerabilities. At a recent\u00a0<a href=\"http:\/\/www.pewinternet.org\/2017\/06\/06\/the-internet-of-things-connectivity-binge-what-are-the-implications\/\" target=\"_blank\" rel=\"noopener\">DEF CON<\/a>, 47 vulnerabilities affecting 23 connected items \u2013 including webcams, door locks, thermostats and baby monitors \u2013 were disclosed. With these vulnerabilities, cyber criminals now have more entry points and can move laterally across networks. As a result, cyber attacks can have far more extensive effects than ever before. Despite this information,\u00a0<a href=\"https:\/\/www.techrepublic.com\/article\/80-of-iot-apps-not-tested-for-vulnerabilities-report-says\/\" target=\"_blank\" rel=\"noopener\">80 percent<\/a>\u00a0of organizations do not routinely test their IoT apps for security vulnerabilities.<\/p>\n<p>Developing resilience to withstand cyber attacks is critical to future success. Safeguarding software and connected devices \u2013 and making it as difficult as possible for exploitation \u2013 will help to improve overall organization system security.<\/p>\n<p>Organizations must be proactive and operate in a state of readiness. Embracing a holistic, risk-based strategy enables organizations to manage their risk awareness, security, detection, response and recovery. By focusing on mitigation options, continuous monitoring, diagnosis and remediation, companies are better able to protect themselves and proactively confront potential situations before they become an acute threat.<\/p>\n<p>Read the full Motorola Solutions White Paper\u00a0<a href=\"\/wp-content\/uploads\/sites\/3\/2018\/11\/cyber-resilience-whitepaper.pdf\" target=\"_blank\" rel=\"noopener\">here<\/a>\u00a0to learn more about the emergence of new attack vectors and how a holistic strategy can help defend against emerging cyber threats.<\/p>\n","protected":false},"excerpt":{"rendered":"Can your cell phone be used to steal your email password or fingerprint data? Can hackers access personal information from your heart rate monitor, fitness tracker or smartwatch? What may have once sounded like science fiction is rapidly becoming reality. We now live in an era of connectivity \u2013 with digitally connected devices permeating every&#8230; <a class=\"btn-featured test\" href=\"https:\/\/blog-test.motorolasolutions.com\/en_us\/increasing-connectivity-exposes-new-cyber-attack-vectors\/\" data-uet=\"{&#39;event_category&#39;:&#39;blog featured post interaction&#39;,&#39;event_action&#39;:&#39;blog read more button click&#39;,&#39;event_label&#39;:&#39;Increasing Connectivity Exposes New Cyber Attack Vectors&#39;,&#39;event_page_area&#39;:&#39;body&#39;,&#39;restriction_status&#39;:&#39;public&#39;,&#39;link_text&#39;:&#39;Increasing Connectivity Exposes New Cyber Attack Vectors&#39;,&#39;link_url&#39;:&#39;https:\/\/blog-test.motorolasolutions.com\/en_us\/increasing-connectivity-exposes-new-cyber-attack-vectors\/&#39;,&#39;tealium_event&#39;:&#39;link_click&#39;,&#39;page_type&#39;:&#39;&#39;}\" >Read More<\/a>","protected":false},"author":12,"featured_media":1649,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[7,3,8],"tags":[12,17,21],"class_list":["post-1523","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-law-enforcement","category-energy-industries","category-fire-and-emergency-medical-services","tag-astro-p25-infrastructure","tag-cybersecurity","tag-infrastructure-services"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Increasing Connectivity Exposes New Cyber Attack Vectors - Motorola Solutions Blog<\/title>\n<meta name=\"description\" content=\"Read the article Increasing Connectivity Exposes New Cyber Attack Vectors and learn more about our solutions and services.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Increasing Connectivity Exposes New Cyber Attack Vectors - Motorola Solutions Blog\" \/>\n<meta property=\"og:description\" content=\"Read the article Increasing Connectivity Exposes New Cyber Attack Vectors and learn more about our solutions and services.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog-test.motorolasolutions.com\/en_us\/increasing-connectivity-exposes-new-cyber-attack-vectors\/\" \/>\n<meta property=\"og:site_name\" content=\"Motorola Solutions Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/MotorolaSolutions\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-09T13:12:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-content\/uploads\/sites\/3\/2018\/10\/Increasing-Connectivity-Exposes-New-Cyber-Attack-Vectors-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"298\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@motosolutions\" \/>\n<meta name=\"twitter:site\" content=\"@motosolutions\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/increasing-connectivity-exposes-new-cyber-attack-vectors\/\",\"url\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/increasing-connectivity-exposes-new-cyber-attack-vectors\/\",\"name\":\"Increasing Connectivity Exposes New Cyber Attack Vectors - Motorola Solutions Blog\",\"isPartOf\":{\"@id\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/increasing-connectivity-exposes-new-cyber-attack-vectors\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/increasing-connectivity-exposes-new-cyber-attack-vectors\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-content\/uploads\/sites\/3\/2018\/10\/Increasing-Connectivity-Exposes-New-Cyber-Attack-Vectors-1.jpg\",\"datePublished\":\"2024-09-09T13:12:58+00:00\",\"author\":{\"@id\":\"\"},\"description\":\"Read the article Increasing Connectivity Exposes New Cyber Attack Vectors and learn more about our solutions and services.\",\"breadcrumb\":{\"@id\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/increasing-connectivity-exposes-new-cyber-attack-vectors\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog-test.motorolasolutions.com\/en_us\/increasing-connectivity-exposes-new-cyber-attack-vectors\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/increasing-connectivity-exposes-new-cyber-attack-vectors\/#primaryimage\",\"url\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-content\/uploads\/sites\/3\/2018\/10\/Increasing-Connectivity-Exposes-New-Cyber-Attack-Vectors-1.jpg\",\"contentUrl\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-content\/uploads\/sites\/3\/2018\/10\/Increasing-Connectivity-Exposes-New-Cyber-Attack-Vectors-1.jpg\",\"width\":500,\"height\":298,\"caption\":\"Increasing-Connectivity-Exposes-New-Cyber-Attack-Vectors\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/increasing-connectivity-exposes-new-cyber-attack-vectors\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Increasing Connectivity Exposes New Cyber Attack Vectors\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/#website\",\"url\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/\",\"name\":\"Motorola Solutions Blog\",\"description\":\"Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Increasing Connectivity Exposes New Cyber Attack Vectors - Motorola Solutions Blog","description":"Read the article Increasing Connectivity Exposes New Cyber Attack Vectors and learn more about our solutions and services.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Increasing Connectivity Exposes New Cyber Attack Vectors - Motorola Solutions Blog","og_description":"Read the article Increasing Connectivity Exposes New Cyber Attack Vectors and learn more about our solutions and services.","og_url":"https:\/\/blog-test.motorolasolutions.com\/en_us\/increasing-connectivity-exposes-new-cyber-attack-vectors\/","og_site_name":"Motorola Solutions Blog","article_publisher":"https:\/\/www.facebook.com\/MotorolaSolutions","article_published_time":"2024-09-09T13:12:58+00:00","og_image":[{"width":500,"height":298,"url":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-content\/uploads\/sites\/3\/2018\/10\/Increasing-Connectivity-Exposes-New-Cyber-Attack-Vectors-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@motosolutions","twitter_site":"@motosolutions","twitter_misc":{"Written by":"","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/blog-test.motorolasolutions.com\/en_us\/increasing-connectivity-exposes-new-cyber-attack-vectors\/","url":"https:\/\/blog-test.motorolasolutions.com\/en_us\/increasing-connectivity-exposes-new-cyber-attack-vectors\/","name":"Increasing Connectivity Exposes New Cyber Attack Vectors - Motorola Solutions Blog","isPartOf":{"@id":"https:\/\/blog-test.motorolasolutions.com\/en_us\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog-test.motorolasolutions.com\/en_us\/increasing-connectivity-exposes-new-cyber-attack-vectors\/#primaryimage"},"image":{"@id":"https:\/\/blog-test.motorolasolutions.com\/en_us\/increasing-connectivity-exposes-new-cyber-attack-vectors\/#primaryimage"},"thumbnailUrl":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-content\/uploads\/sites\/3\/2018\/10\/Increasing-Connectivity-Exposes-New-Cyber-Attack-Vectors-1.jpg","datePublished":"2024-09-09T13:12:58+00:00","author":{"@id":""},"description":"Read the article Increasing Connectivity Exposes New Cyber Attack Vectors and learn more about our solutions and services.","breadcrumb":{"@id":"https:\/\/blog-test.motorolasolutions.com\/en_us\/increasing-connectivity-exposes-new-cyber-attack-vectors\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog-test.motorolasolutions.com\/en_us\/increasing-connectivity-exposes-new-cyber-attack-vectors\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog-test.motorolasolutions.com\/en_us\/increasing-connectivity-exposes-new-cyber-attack-vectors\/#primaryimage","url":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-content\/uploads\/sites\/3\/2018\/10\/Increasing-Connectivity-Exposes-New-Cyber-Attack-Vectors-1.jpg","contentUrl":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-content\/uploads\/sites\/3\/2018\/10\/Increasing-Connectivity-Exposes-New-Cyber-Attack-Vectors-1.jpg","width":500,"height":298,"caption":"Increasing-Connectivity-Exposes-New-Cyber-Attack-Vectors"},{"@type":"BreadcrumbList","@id":"https:\/\/blog-test.motorolasolutions.com\/en_us\/increasing-connectivity-exposes-new-cyber-attack-vectors\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog-test.motorolasolutions.com\/en_us\/"},{"@type":"ListItem","position":2,"name":"Increasing Connectivity Exposes New Cyber Attack Vectors"}]},{"@type":"WebSite","@id":"https:\/\/blog-test.motorolasolutions.com\/en_us\/#website","url":"https:\/\/blog-test.motorolasolutions.com\/en_us\/","name":"Motorola Solutions Blog","description":"Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog-test.motorolasolutions.com\/en_us\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":""}]}},"_links":{"self":[{"href":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-json\/wp\/v2\/posts\/1523","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-json\/wp\/v2\/comments?post=1523"}],"version-history":[{"count":1,"href":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-json\/wp\/v2\/posts\/1523\/revisions"}],"predecessor-version":[{"id":2212,"href":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-json\/wp\/v2\/posts\/1523\/revisions\/2212"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-json\/wp\/v2\/media\/1649"}],"wp:attachment":[{"href":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-json\/wp\/v2\/media?parent=1523"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-json\/wp\/v2\/categories?post=1523"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-json\/wp\/v2\/tags?post=1523"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}