IoT usage could lead to more state-sponsored attacks
Published On: August 14, 2018 |
The emergence of the Internet of Things (IoT) as an everyday technology for many businesses could lead to more organisations being left vulnerable to sophisticated hacking attacks perpetrated or sponsored by nation states.
This is according to security professionals surveyed by Armis at a recent Black Hat conference in Las Vegas. In found 93 per cent of respondents agreed that the future of IoT will be more dangerous as the new wave of connected devices opens up opportunities for state-sponsored actors to exploit, ZDNet reports.
Energy and utilities was thought to be the industry most at risk as a result of IoT vulnerabilities, with nearly a quarter of respondents (23 per cent) identifying these companies as vulnerable.
This was followed by healthcare organisations (17 per cent) and the financial sector (15 per cent). Smart city networks, connected vehicles and medical devices were among the IoT devices that could be tempting targets for these state-sponsored hackers.
Previous estimates by Gartner have suggested that by 2020, a quarter of attacks against corporate targets will involve IoT devices, but nearly six out of ten security professionals (59 per cent) at the Black Hat conference believed that figure to be too low.
Armis stated: "It's clear that security professionals are beginning to realise that risky unmanaged devices are increasingly dotting their environments. But the survey shows they don't feel as prepared as they should be to address the risk, and they see more attacks on the horizon."
The biggest challenge identified in IoT security is vulnerabilities, which were highlighted by 38 per cent of respondents. Meanwhile, an inability to patch firmware was named as a concern by 36 per cent of professionals, while 17 per cent said IoT devices that cannot be protected by traditional cyber security tools is a problem.
To address these issues, a quarter of security pros said effective network segmentation was the key to success. Additionally, implementing network access controls (21 per cent), bolstering firewalls (21 per cent) and adding endpoint protection (20 per cent) were all named as among the mitigation strategies respondents expect to use in the coming years.
Share This Post, Choose Your Platform!
With over 20 years in the business telecoms industry and an unrivalled reputation of delivering excellent, personal customer service, Arrow is one of very few companies in the UK able to provide a full telecoms, IT and energy consultancy and service proposition.
Savings through automation, scale, improved service. We’ve got that covered. But the true value comes with empathy, through empowerment, collaboration. It’s connecting people that drives us forward. It’s people that make tomorrow happen.
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.