Attackers Love Targeting IoT Devices: Here’s Why

Date:

Internet of Things (IoT) devices are becoming the favorite targets of attackers due to their lack of designed-in security and chronic default password use, according to a recent report from Forrester. IoT attacks are growing at a faster rate than mainstream breaches, and malicious objects are being blocked on over 40% of OT systems. In some cases, the breaches are used as a pathway to accessing mission-critical systems and sensitive data, leading to devastating consequences for organizations. IoT devices are popular targets for threat actors because they are easy to breach and can lead to large ransomware payouts in industries where uptime is critical. Manufacturing is particularly vulnerable as attackers know that any factory or plant cannot afford to be down for long, so they demand up to four times the ransom than they might from other targets.

Forrester identified four key factors that contribute to IoT devices becoming high-value targets, including weak security measures, the use of default passwords, unsupported operating systems, and connections to the internet. The use of unsupported operating systems increases the risk of devices becoming bricked if they are compromised and cannot be patched. Similarly, the connection to the internet makes IoT devices a liability and conduits for command-and-control attacks, or they become botnets.

To combat these threats, organizations must take action to eliminate blind spots associated with unmanaged or unsupported legacy systems, as well as enforce the use of strong passwords and implement a unified endpoint management (UEM) solution that can discover all assets on an organization’s network. Cybersecurity vendors, including Airgap Networks, Absolute Software, Armis, Cisco, and Entrust, offer IoT security systems and platforms that target security gaps in OT systems and devices.

See also  Snowflake Launches New Data Cloud for Government and Education Industry

IoT devices have become a growing threat vector for companies who rely on them for the real-time data they need to operate. According to recent studies, 73% of IoT-based IV pumps and 50% of voice-over-IP (VoIP) systems are hackable, and overall, 50% of connected devices in a typical hospital have critical risks. Manufacturers are also unsure how to protect legacy IoT devices and programmable logic controllers (PLCs), making securing them difficult for organizations that lack in-house IT and security expertise.

The use of accurate asset discovery, microsegmentation, and identity can help to secure IoT devices, but traditional cybersecurity solutions that require an agent are often not practical. Instead, organizations may need to consider agentless cybersecurity solutions such as Airgap Networks to achieve a seamless, proactive risk response to remediate actively exploited vulnerabilities on all devices and operating systems in an organization’s environment.

Frequently Asked Questions (FAQs) Related to the Above News

Please note that the FAQs provided on this page are based on the news article published. While we strive to provide accurate and up-to-date information, it is always recommended to consult relevant authorities or professionals before making any decisions or taking action based on the FAQs or the news article.

Share post:

Subscribe

Popular

More like this
Related

China and Kazakhstan Strengthen Strategic Partnership for Economic Growth and Stability

China and Kazakhstan enhance strategic partnership for economic growth and stability, boosting bilateral trade and deepening cooperation.

Dubai Silicon Oasis Drives Future Mobility Innovation

Discover how Dubai Silicon Oasis drives future mobility innovation with AI-powered solutions and eco-friendly transportation options.

Nintendo Stands Firm: No AI in Games for Quality Assurance

Nintendo reaffirms commitment to quality by eschewing AI in game development. President Furukawa stands firm in decision.