According to McKinsey’s ‘What’s new with the Internet Things?’, article, every second about 127 new IoT devices go online as rapidly as the 5G Networks. These devices are prone to hacking into an internet-connected network as numerous risks are uniquely associated with unmanaged IoT sensors. These sensors are related to advanced technologies such as gateways, hubs, cloud servers, mobile apps, and control devices.
A recent Forrester report, ‘State Of Enterprise IoT Security In North America: Unmanaged And Unsecured,’ revealed that as the proportion of unmanaged devices grows within enterprises, the organization’s attack surface also follows the same path.
two-thirds of the Forrester survey respondents claimed they had personally experienced a security incident related to their unmanaged IoT devices. These devices include office equipment and peripherals, automation sensors for office buildings, personal consumer devices, VoIP phones, bright TV screens and monitors, Bluetooth, HVAC systems, security systems, routers, switches, firewalls, and many more.
Also Read: Questions CISOs Must Ask to Help Alleviate Supply Chain Attacks
There are many practical explanations for those vulnerabilities. Last year, there were reports on some flaws disclosed in the four TCP/IP stacks codes. These were used to integrate network communication protocols and establish connections between devices and the internet.
According to the 2019 survey, ‘The trust opportunity: Exploring Consumers’ Attitudes to the Internet of Things’ revealed that about 63% of consumers even find connected devices “creepy.”
- The benefits of IoT are indeed undeniable, but high-profile attacks, combined with uncertainty about security risks and their associated costs, are keeping many businesses away from adopting this technology.
- Cyber-attacks on IoT ecosystems could have far more unpredictable effects as they translate more easily into physical consequences. This is most prominent in the industrial internet of things (IIoT), where cyber-attacks have already demonstrated cascading consequences earlier.
- Specific strategies and tools, more than a quick fix will be necessary to secure more specialized systems and aspects of the IoT. A few practices can reduce risks and prevent threats to IoT usage for enterprises:
- The administrator of things. Having a person act as an administrator of IoT devices and the network can minimize security oversights and exposures. It is critical to monitor during the remote work set up, where IT experts have limited control in securing home networks.