Enterprises preparing for IoT enablement – but are vulnerable to older wireless network security threats
802 Secure has outlined the present state of the IoT network security in its new infographic detailing how ‘shadow IoT/IIoT’ devices are exposing enterprise networks and information to security risks.
The key statistics presented in the "IoT Cloud Security Report 2017" infographic explicitly spotlights the greatest IoT risks and threats having a negative impact on enterprises. The report highlighted that all enterprise environments had rogue consumer IoT wireless devices on their networks transmitting information to other individuals, networks, and the cloud, while a total of 90% of the enterprises had Shadow IoT/IIoT wireless networks.
The analytics highlighted in the infographic were compiled from a subset of enterprises with more than 10,000 employees. Every week, enterprises fall prey to at least one wireless attack, the report notes. Spy cams and new wireless USB thumb drive were included in the list of emerging threats for enterprises.
The infographic was released at the Internet of Things World 2018 event held in Santa Clara, California earlier in May.
Mike Raggo, chief security and threat research officer at 802 Secure, said: "While most organisations prepare for IoT enablement, our threat intelligence shows that most companies are still vulnerable to 10 year old wireless vulnerabilities.”
"Organisations need to broaden their view into these invisible devices and networks to identify rogue IoT devices on the network, visibility into shadow IoT networks, and detection of nearby threats such as drones and spy cameras,” Raggo added. “Through IoT wireless network monitoring organizations can expose these devices, tie approved devices into their asset management, isolate rogues, measure security posture, identify attacks, and mitigate threats through deceptive networking.”
Garry Drummond, founder and CEO of 802 Secure, commented: "With 95% of IoT devices being wirelessly enabled, a new approach to detect and assess risk is required. 802 Secure's novel approach of solving the mass problem of IoT network security, through the use of software-defined-radios and big data analytics have allowed our clients to identify these new IoT operating systems, frequencies and vulnerabilities 'on-the-fly' using patent-pending methodologies incorporating statistical, procedural and behavioral AI.”
Meanwhile, Internet of Things World’s most recent survey polled over 100 IoT decision makers to know their problems linked to blockchain, implementation, cybersecurity and scaling. While highlighting the major problems enterprises are encountering in scaling IoT operations, dealing with “legacy” devices and software was identified by 53.06% of respondents, and 45.92% underscored the necessity of highly specialised and custom solutions.
During the survey, 46.94% of executives said that their IoT solution projects are plagued by implementation problems, while zero backing for a production-quality deployment was named as a major obstacle by another 12.24% of survey respondents.
When it came to cybersecurity related concerns, 36.73% of respondents are unsure or not confident enough to say that their enterprises could manage to secure and protect information within their IoT ecosystem. The survey results showed that 50% of the respondents are not keeping an inventory of IoT devices and 43.4% are not carrying out vulnerability testing to find out where the weak points are in the enterprise network.
According to the survey, 46% of enterprises are considering using blockchain technology in their IoT strategy. The possible benefits that enterprises foresee in blockchain technology investment are declining collusion and tampering threats (15.05%) and building user confidence with blockchain cryptography (13.98%).
Interested in hearing industry leaders discuss subjects like this and sharing their IoT use-cases? Attend the IoT Tech Expo World Series events with upcoming shows in Silicon Valley, London and Amsterdam to learn more.
- » Six steps to get IoT data crunching right: The importance of organisational structure
- » How to enable a better business case through IoT
- » Less than half of businesses are able to detect IoT device breaches
- » Karamba Security: Vehicles face 300,000 attacks per month
- » McAfee: IoT malware increasing alongside 480 threats per minute