K

Kathleen Martin

Guest
The Internet of Things (IoT) has ushered in a new era of access, bringing with it both opportunities and potential vulnerabilities across the whole technology stack. IoT has already reached beyond two hundred known applications in enterprise settings and IoT devices are projected to increase to 43 billion by 2023.
In addition, research suggests that there will be more than 75 billion devices connected to the internet by 2025, which equals around 10 IoT devices for every human on earth.
Various industries are using IoT for a more connected experience across their businesses. For example, manufacturing providers have increased IoT spending significantly over the past few years.
During the pandemic, manufacturers leveraged IoT to monitor and maintain equipment without a full team of staff, for tasks such as temperature and usage monitoring.
Gartner estimates that installed IoT endpoints for manufacturing and natural resources industries are forecast to grow 1.9 billion units in 2028. This foreseen estimate is fivefold the size of 331.5 million units in 2018.
As Singapore continues to roll out smart business initiatives such as the Networked Trade Platform to position itself as a leader in trade and supply chain, IoT devices will play a role in fulfilling said initiatives.
But, as IoT expands across the globe to offer a more connected experience, security undoubtedly takes a hit. IoT technology creates a broader attack surface, leaving businesses exposed to threats of attack.
The increasing attack surface of IoT devices
IoT devices are notoriously hard to monitor and secure, as most of them utilise legacy systems and infrequently connect to the internet, making them hard to track. This beckons a frustrating question for many CISOs and security teams; How can security experts secure and patch IoT devices if they don't know the device is there?
This is especially so when employees bring their devices to work (BYOD) which results in the issue of shadow IT. It refers to the use of technology without the knowledge of IT departments and this contributes to the lack of visibility on IoT devices.
As the office disruptions brought about by the pandemic are slowly diminishing, plenty of employees surveyed by EY expect to return to the office, whereas others look to a hybrid work model. This could spell an influx of vulnerable devices being brought back to the office as people return to work post-pandemic.
Furthermore, the endpoint can be deployed but with these small, unadvanced IoT devices, normal security telemetry can’t be. This poses additional threats to devices. Systems are left vulnerable when vital updates and device inventory are lacking.
Continue reading: https://futureiot.tech/iot-growth-a-gateway-to-opportunity-threats/
 

Attachments

  • p0007273.m06922.pexels_tara_winstead_8386440_1140x760.jpg
    p0007273.m06922.pexels_tara_winstead_8386440_1140x760.jpg
    49 KB · Views: 42
  • Like
Reactions: Kathleen Martin