{"id":7955,"date":"2022-08-25T15:20:08","date_gmt":"2022-08-25T22:20:08","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=7955"},"modified":"2023-02-28T14:29:13","modified_gmt":"2023-02-28T22:29:13","slug":"hhs-hc3-provides-guidance-on-iot-security-risks-and-suggested-mitigations","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/hhs-hc3-provides-guidance-on-iot-security-risks-and-suggested-mitigations\/","title":{"rendered":"HHS HC3 Provides Guidance on IoT Security Risks and Suggested Mitigations"},"content":{"rendered":"<p>The Health and Human Services (HHS) Health Sector Cybersecurity Coordination Center (HC3) has provided expanded guidance in a new <strong><a href=\"https:\/\/www.hhs.gov\/sites\/default\/files\/internet-of-things-security-analyst-note.pdf\" target=\"_blank\" rel=\"noopener\">Analyst Note<\/a><\/strong> on internet of things (IoT) security risks and suggested mitigations.<\/p>\n<p>The reasons for the increased focus on IoT security are compelling. Today, there are about 7 billion IoT-connected devices, and estimates project this will increase to over 20 billion devices in 2025.<sup>1<\/sup> In July of this year, the vendor SonicWall observed a 123% spike in IoT malware attack volumes impacting healthcare. An earlier report by CrowdStrike and Medigate determined that approximately 80 percent of the surveyed healthcare organizations reported IoT security events within the previous 19 months.<sup>2<\/sup><\/p>\n<p>Healthcare today relies on many interconnections, and this number is expected to grow rapidly. As the number of interconnections increase, so does the available attack surface. The number of cyberattacks impacting IoT will continue to expand. Adding IoT to an organization can increase the attack surface if the network isn\u2019t segmented into secure zones.<\/p>\n<p>Network segmentation is highly recommended by HHS HC3. Network segmentation splits the network into subnetworks or zones which can limit access, reduce congestion, and limit failure.<\/p>\n<p>Network segmentation can help isolate vulnerable IoT devices from other information technology equipment in use. Network segmentation reduces risk of compromise and is part of building out a Zero Trust architecture.<\/p>\n<p>Common IoT attacks can include privilege escalation, eavesdropping, man-in-the-middle attacks, brute-force attacks, physical tampering with IoT devices, DDoS attacks, firmware hijacking, and more.<\/p>\n<p>Suggested mitigations offered by HHS HC3 to help protect IoT devices include:<\/p>\n<ul>\n<li>Implement a zero trust architecture. Refer to the National Security Agency <strong><a href=\"\/security\/the-national-security-agency-releases-guidance-on-zero-trust-security\/\">guidance on zero trust security<\/a><\/strong>.<\/li>\n<li>Change default router settings.<\/li>\n<li>Pick a strong password\u2014NIST <strong><a href=\"https:\/\/www.nist.gov\/identity-access-management\/roadmap-nist-special-publication-800-63-3-digital-identity-guidelines\" target=\"_blank\" rel=\"noopener\">provides guideline 800-63<\/a><\/strong>.<\/li>\n<li>Try not to use Universal Plug and Play (UPnP) as it can render devices more vulnerable to cyberattack.<\/li>\n<li>Timely and complete software and firmware patches and updates are essential to eliminating the great majority of known vulnerabilities.<\/li>\n<\/ul>\n<p>Healthcare Remains in the Center of the Bullseye<\/p>\n<p>Healthcare remains one of the biggest targets for cyberattacks globally. Healthcare data is<br \/>\ncomprehensive and provides all the materials cyber criminals need to support identity theft and falsify financial applications. Ransomware attacks continue to impact healthcare institutions globally, and continue to jeopardize the availability of critical services in hospitals and provider organizations.<\/p>\n<p>IoT devices generally have minimal security. If controls like segmentation are not in place, IoT-connected devices have large and virtually unprotected attack surfaces. Once malware circulates within the hospital networks, it can easily infect a multitude of IoT devices, possibly medical devices, provider laptops and desktops, mobile devices, ambulatory physicians, and the interconnected healthcare ecosystem. Close visibility and inspection of the traffic emanating from these devices can help identify and shut down IoT-based threats and others before they can result in a reportable data breach or extortion of funds.<\/p>\n<p>Threat intelligence and enhanced DNS security capabilities can help healthcare institutions potentially find new ways to reduce the risk of data exfiltration. This, in turn, may assist with efforts to meet health care compliance, which is regulated by the Health Insurance Portability and Accountability Act of 1996.<\/p>\n<h3>Protecting Healthcare Institutions with BloxOne Threat Defense<\/h3>\n<p>BloxOne Threat Defense protects enterprise users, devices, and systems no matter where they are, strengthening and optimizing your security posture from the foundation up. Its hybrid architecture extends protection across your on-premises, remote locations, and teleworking environment. It detects and blocks phishing, exploits, ransomware, and other modern malware, and it prevents workers from accessing objectionable content restricted by policy. Unique patented technology prevents DNS-based data exfiltration, to keep protected data safe, monitors for advanced threats (including lookalike domains) and automates incident response so that your security ecosystem can remediate any incidents quickly.<\/p>\n<p>Infoblox controls enforce your policies and protect all the employees and devices in a healthcare institution, both on-premises and remote. Using DNS as an essential control point ensures that every Internet request, either from a medical worker&#8217;s laptop or from a connected healthcare device, is inspected to determine if it is malicious. DNS also gives you scalable web and content filtering and reduces your overall threat defense costs.<\/p>\n<p>From an IoT perspective, EDR\/XDR solutions have limited to no visibility on these devices and endpoint security can\u2019t always be deployed on them. This is where BloxOne Threat Defense and DNS security comes into the picture to offer protection against malware and data theft, without the need for agents.<\/p>\n<p>More data on Infoblox solutions for <strong><a href=\"https:\/\/www.infoblox.com\/solutions\/healthcare\/\" target=\"_blank\" rel=\"noopener\">healthcare are located here<\/a><\/strong>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-7683\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/shields-up.png\" alt=\"\" width=\"512\" height=\"137\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/shields-up.png 512w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/shields-up-300x80.png 300w\" sizes=\"auto, (max-width: 512px) 100vw, 512px\" \/><\/p>\n<p>Russia\u2019s invasion of Ukraine could impact organizations both within and beyond the region, to include <a href=\"https:\/\/www.cisa.gov\/uscert\/russia\"><strong>malicious cyber activity<\/strong><\/a><span style=\"font-weight: 400;\"> against the U.S. homeland, including as a response to the unprecedented economic costs imposed on Russia by the U.S. and our allies and partners. Evolving intelligence indicates that the Russian Government is exploring options for potential cyberattacks. Every organization\u2014large and small\u2014must be prepared to respond to disruptive cyber incidents. As the nation\u2019s cyber defense agency, CISA stands ready to help organizations prepare for, respond to, and mitigate the impact of cyberattacks. When cyber incidents are reported quickly, we can use this information to render assistance and as a warning to prevent other organizations and entities from falling victim to a similar attack.<\/span><\/p>\n<p>Organizations should report anomalous cyber activity and\/or cyber incidents 24\/7 to report@cisa.gov or (888) 282-0870.<\/p>\n<ol>\n<li><a href=\"https:\/\/healthitsecurity.com\/news\/hc3-provides-tips-for-maintaining-iot-security-in-healthcare\" target=\"_blank\" rel=\"noopener\"><strong>https:\/\/healthitsecurity.com\/news\/hc3-provides-tips-for-maintaining-iot-security-in-healthcare<\/strong><\/a><\/li>\n<li><strong><a href=\"https:\/\/healthitsecurity.com\/news\/iot-malware-attack-volume-up-123-in-healthcare\" target=\"_blank\" rel=\"noopener\">https:\/\/healthitsecurity.com\/news\/iot-malware-attack-volume-up-123-in-healthcare<\/a><\/strong><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>The Health and Human Services (HHS) Health Sector Cybersecurity Coordination Center (HC3) has provided expanded guidance in a new Analyst Note on internet of things (IoT) security risks and suggested mitigations. The reasons for the increased focus on IoT security are compelling. Today, there are about 7 billion IoT-connected devices, and estimates project this will [&hellip;]<\/p>\n","protected":false},"author":324,"featured_media":7818,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[228,749,750,751,752],"class_list":{"0":"post-7955","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-bloxone-threat-defense","9":"tag-cyberdefense","10":"tag-databreach","11":"tag-dnssecurity","12":"tag-iotsecurity","13":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>HHS HC3 Provides Guidance on IoT Security Risks and Suggested Mitigations | Infoblox<\/title>\n<meta name=\"description\" content=\"Infoblox controls enforce your policies and protect all the employees and devices in a healthcare institution, both on-premises and remote.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/hhs-hc3-provides-guidance-on-iot-security-risks-and-suggested-mitigations\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"HHS HC3 Provides Guidance on IoT Security Risks and Suggested Mitigations\" \/>\n<meta property=\"og:description\" content=\"Infoblox controls enforce your policies and protect all the employees and devices in a healthcare institution, both on-premises and remote.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/hhs-hc3-provides-guidance-on-iot-security-risks-and-suggested-mitigations\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-25T22:20:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-28T22:29:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/vextrio-ddga-domains-spread-adware-spyware-and-scam-web-forms.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"408\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Michael Zuckerman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michael Zuckerman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/hhs-hc3-provides-guidance-on-iot-security-risks-and-suggested-mitigations\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/hhs-hc3-provides-guidance-on-iot-security-risks-and-suggested-mitigations\\\/\"},\"author\":{\"name\":\"Michael Zuckerman\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/212816c17be869578ba1574b5fc7abf4\"},\"headline\":\"HHS HC3 Provides Guidance on IoT Security Risks and Suggested Mitigations\",\"datePublished\":\"2022-08-25T22:20:08+00:00\",\"dateModified\":\"2023-02-28T22:29:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/hhs-hc3-provides-guidance-on-iot-security-risks-and-suggested-mitigations\\\/\"},\"wordCount\":903,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/hhs-hc3-provides-guidance-on-iot-security-risks-and-suggested-mitigations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/vextrio-ddga-domains-spread-adware-spyware-and-scam-web-forms.jpg\",\"keywords\":[\"BloxOne\u00ae Threat Defense\",\"Cyberdefense\",\"DataBreach\",\"DNSSecurity\",\"IotSecurity\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/hhs-hc3-provides-guidance-on-iot-security-risks-and-suggested-mitigations\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/hhs-hc3-provides-guidance-on-iot-security-risks-and-suggested-mitigations\\\/\",\"name\":\"HHS HC3 Provides Guidance on IoT Security Risks and Suggested Mitigations | Infoblox\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/hhs-hc3-provides-guidance-on-iot-security-risks-and-suggested-mitigations\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/hhs-hc3-provides-guidance-on-iot-security-risks-and-suggested-mitigations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/vextrio-ddga-domains-spread-adware-spyware-and-scam-web-forms.jpg\",\"datePublished\":\"2022-08-25T22:20:08+00:00\",\"dateModified\":\"2023-02-28T22:29:13+00:00\",\"description\":\"Infoblox controls enforce your policies and protect all the employees and devices in a healthcare institution, both on-premises and remote.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/hhs-hc3-provides-guidance-on-iot-security-risks-and-suggested-mitigations\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/hhs-hc3-provides-guidance-on-iot-security-risks-and-suggested-mitigations\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/hhs-hc3-provides-guidance-on-iot-security-risks-and-suggested-mitigations\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/vextrio-ddga-domains-spread-adware-spyware-and-scam-web-forms.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/vextrio-ddga-domains-spread-adware-spyware-and-scam-web-forms.jpg\",\"width\":612,\"height\":408,\"caption\":\"Hackers using laptop computers to penetrate security systems to steal big data from the server room\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/hhs-hc3-provides-guidance-on-iot-security-risks-and-suggested-mitigations\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"HHS HC3 Provides Guidance on IoT Security Risks and Suggested Mitigations\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/212816c17be869578ba1574b5fc7abf4\",\"name\":\"Michael Zuckerman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_324_1628613720-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_324_1628613720-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_324_1628613720-96x96.jpg\",\"caption\":\"Michael Zuckerman\"},\"description\":\"Michael Zuckerman is a seasoned B2B product marketing and marketing strategy consultant with experience in the cybersecurity marketplace. Zuckerman\u2019s domain experience in cybersecurity over the past 10 years includes DNS security, threat intelligence, threat intelligence platforms (TIP), container security, mobile device security, moving target defense, network threat analysis (AI), sandbox, deception technology, cloud access security brokers (CASB), SASE, AI based SIEM, secure collaborative governance, and related technology sets to include data loss prevention (DLP), user and entity behavior analytics (UEBA), and encryption.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/michael-zuckerman\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"HHS HC3 Provides Guidance on IoT Security Risks and Suggested Mitigations | Infoblox","description":"Infoblox controls enforce your policies and protect all the employees and devices in a healthcare institution, both on-premises and remote.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/hhs-hc3-provides-guidance-on-iot-security-risks-and-suggested-mitigations\/","og_locale":"en_US","og_type":"article","og_title":"HHS HC3 Provides Guidance on IoT Security Risks and Suggested Mitigations","og_description":"Infoblox controls enforce your policies and protect all the employees and devices in a healthcare institution, both on-premises and remote.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/hhs-hc3-provides-guidance-on-iot-security-risks-and-suggested-mitigations\/","og_site_name":"Infoblox Blog","article_published_time":"2022-08-25T22:20:08+00:00","article_modified_time":"2023-02-28T22:29:13+00:00","og_image":[{"width":612,"height":408,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/vextrio-ddga-domains-spread-adware-spyware-and-scam-web-forms.jpg","type":"image\/jpeg"}],"author":"Michael Zuckerman","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Michael Zuckerman","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/hhs-hc3-provides-guidance-on-iot-security-risks-and-suggested-mitigations\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/hhs-hc3-provides-guidance-on-iot-security-risks-and-suggested-mitigations\/"},"author":{"name":"Michael Zuckerman","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/212816c17be869578ba1574b5fc7abf4"},"headline":"HHS HC3 Provides Guidance on IoT Security Risks and Suggested Mitigations","datePublished":"2022-08-25T22:20:08+00:00","dateModified":"2023-02-28T22:29:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/hhs-hc3-provides-guidance-on-iot-security-risks-and-suggested-mitigations\/"},"wordCount":903,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/hhs-hc3-provides-guidance-on-iot-security-risks-and-suggested-mitigations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/vextrio-ddga-domains-spread-adware-spyware-and-scam-web-forms.jpg","keywords":["BloxOne\u00ae Threat Defense","Cyberdefense","DataBreach","DNSSecurity","IotSecurity"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/hhs-hc3-provides-guidance-on-iot-security-risks-and-suggested-mitigations\/","url":"https:\/\/www.infoblox.com\/blog\/security\/hhs-hc3-provides-guidance-on-iot-security-risks-and-suggested-mitigations\/","name":"HHS HC3 Provides Guidance on IoT Security Risks and Suggested Mitigations | Infoblox","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/hhs-hc3-provides-guidance-on-iot-security-risks-and-suggested-mitigations\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/hhs-hc3-provides-guidance-on-iot-security-risks-and-suggested-mitigations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/vextrio-ddga-domains-spread-adware-spyware-and-scam-web-forms.jpg","datePublished":"2022-08-25T22:20:08+00:00","dateModified":"2023-02-28T22:29:13+00:00","description":"Infoblox controls enforce your policies and protect all the employees and devices in a healthcare institution, both on-premises and remote.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/hhs-hc3-provides-guidance-on-iot-security-risks-and-suggested-mitigations\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/hhs-hc3-provides-guidance-on-iot-security-risks-and-suggested-mitigations\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/hhs-hc3-provides-guidance-on-iot-security-risks-and-suggested-mitigations\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/vextrio-ddga-domains-spread-adware-spyware-and-scam-web-forms.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/vextrio-ddga-domains-spread-adware-spyware-and-scam-web-forms.jpg","width":612,"height":408,"caption":"Hackers using laptop computers to penetrate security systems to steal big data from the server room"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/hhs-hc3-provides-guidance-on-iot-security-risks-and-suggested-mitigations\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"HHS HC3 Provides Guidance on IoT Security Risks and Suggested Mitigations"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/212816c17be869578ba1574b5fc7abf4","name":"Michael Zuckerman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_324_1628613720-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_324_1628613720-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_324_1628613720-96x96.jpg","caption":"Michael Zuckerman"},"description":"Michael Zuckerman is a seasoned B2B product marketing and marketing strategy consultant with experience in the cybersecurity marketplace. Zuckerman\u2019s domain experience in cybersecurity over the past 10 years includes DNS security, threat intelligence, threat intelligence platforms (TIP), container security, mobile device security, moving target defense, network threat analysis (AI), sandbox, deception technology, cloud access security brokers (CASB), SASE, AI based SIEM, secure collaborative governance, and related technology sets to include data loss prevention (DLP), user and entity behavior analytics (UEBA), and encryption.","url":"https:\/\/www.infoblox.com\/blog\/author\/michael-zuckerman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7955","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/324"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=7955"}],"version-history":[{"count":3,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7955\/revisions"}],"predecessor-version":[{"id":7957,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7955\/revisions\/7957"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/7818"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=7955"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=7955"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=7955"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}