The Cyber Review: A look into IoT forensics. cybersecurity automation

March 23, 2021
Written by Ana R.


From smartphones to smart fridges, anything that can be connected to the internet is usually connected (known as internet of things IOT), and although the devices make our day to day lives easier, inadequate cybersecurity protection can cause more difficulties than ease. IoT forensics involves identification,preservation, analysis, and presentation of digital evidence after the occurrence of the crime. Aside from smart IoT devices, cloud computing is also a part of IoT forensics.

The difference between digital forensics and IoT forensics is that digital forensics is a broader field that includes recognizing, parsing, and exhibiting digital evidence from several sources after a cyberattack, it has many categories and the evidence gathered can be used in a court of law. It involves the examination of all devices that are capable of storing data in a digital format.

Digital forensics categories:

  • Network forensics
  • Disk forensics
  • Email forensics
  • Database forensics
  • Malware forensics
  • Mobile device forensics
  • Computer forensics

Best practices for cybersecurity defences in the new normal

It's been over a year since lockdowns around the world started to take place due to the widespread of COVID-19. Over the year, we have all learned a lot and especially when it comes to the remote workforce. Best practices to keep in mind for cybersecurity:

  • Watch for phishing emails: inboxes are flooded with phishing emails. Routine password changes are important as well as ensuring employees are familiar with the tells of a phishing scam.
  • Patching is still relevant: Those who patch regularly are more protected to emerging vulnerabilities; the likelihood of an attack is greater where a hacker can gain access in three steps or fewer. Anything more sophisticated, where a system is well defended, and threats are more easily discouraged.
  • Artificial hacking intelligence: the tech can identify malicious activity

The rising cybersecurity issues need to be addressed by adopting automation and intelligent technology

The quick changes in technology and increased need of depending on third party programs has expanded data vulnerability. Cybersecurity automation is a new field, which has a promising approach towards attaining better security. Automation in cybersecurity can be achieved by leveraging cutting-edge technologies like artificial intelligence and machine learning. Cybersecurity automation will automate the repetitive and mundane tasks and enable employees to focus on tasks that need high skills. Other than these basic functions, automation of cybersecurity will enable monitoring and detecting threats with maximum efficiency and minimum human intervention.