https://www.iotworldtoday.com/wp-content/themes/ioti_child/assets/images/logo/mobile-logo.png
  • Home
  • News
    • Back
    • Roundups
  • Strategy
  • Special Reports
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Podcasts
    • Strategic Partners
    • Latest videos
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Editorial Submissions
  • Events
    • Back
    • Embedded IoT World (Part of DesignCon) 2022
Iot World Today
  • NEWSLETTER
  • Home
  • News
    • Back
    • Roundups
  • Strategy
  • Special Reports
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Podcasts
    • Strategic Partners
    • Latest videos
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Editorial Submissions
  • Events
    • Back
    • Embedded IoT World (Part of DesignCon) 2022
  • newsletter
  • IIoT
  • Cities
  • Energy
  • Homes/Buildings
  • Transportation/Logistics
  • Connected Health Care
  • Retail
  • AI
  • Metaverse
  • Development
  • Security
ioti.com

Security


Getty Images

Image shows a man in a tie using a mobile phone

For BYOD Policies, IoT Brings New Risks, Report Says

Companies need to implement reasonable controls and best practices within their BYOD policies to protect organizations from IoT-based malware.
  • Written by Courtney Bjorlin
  • 5th June 2018

As the number of IoT devices on corporate networks explodes, corporate BYOD policies governing the use of personal devices may be falling short in protecting enterprises from IoT-based malware, according to a report from Infoblox. 

Some 82 percent of the 1,000 IT directors surveyed by the Silicon Valley IT automation and security company indicated they had security policies for connected devices in place, and of those, 88 percent believed they were effective or very effective, according to the report. But a corresponding employee survey showed many employees either aren’t following these policies, or don’t even know they exist at all.

That’s as the number of IoT devices being connected to corporate networks continues to grow. A third of companies in the U.S., UK and Germany have more than 1,000 “shadow IoT devices” connected to their network on a typical day, according to the survey. Fitness trackers are the most common such devices on enterprise networks, followed by digital assistants, smart TVs, smart appliances and video game consoles, according to the report, “What is lurking on your network: Exposing the threat of shadow devices.”

“The issue will get worse, and companies that don’t put reasonable controls and implement good practices, they’re going to have infections and they’ll be part of the attack base,” said Sean Tierney, director of cyber intelligence for Infoblox.

These devices are often exploited by cybercriminals using a number of different tactics, to steal data or cause disruption, according to the report. Employees surveyed in the U.S. and UK said they logged onto corporate networks to access social media, and download apps, games and films.

Compounding the problem is that policies typically used to secure devices – such as requiring employees connect personal phones or tablets to a guest network for use – aren’t sufficient to ensure secure connections of IoT devices, according to Tierney, where the true scope of vulnerabilities and the scale at which they can take effect is still not entirely clear.

“In an ideal world, it should not matter, but the reality is different devices have different capabilities and different vulnerabilities,” he said. “We haven’t comprehended the threat scape.”

In developing policies, involve human resources with a representative team of employees, as well as the security team, Tierney recommended. Have a conversation about where the real needs are, and develop a policy that can evolve with the ever-changing threat landscape, according to Tierney. 

But to better guard against attacks, relying on compliance alone isn’t sufficient. Network and security professionals should take steps to restrict access to certain sites, achieve full visibility, and to secure DNS, which can act as an organization’s first line of defense, according to the report. 

In practice, for instance, build policies around the most prevalent IoT devices within the organization, Tierney recommended.

“If you know the brand, and where it’s communicating with, you can build network policies and control that, and address that connection,” Tierney said. 

 

Tags: Article Security Technologies News

Related


  • BotenaGo Source Code Leak Exposes More IoT Devices
    Researchers discovered the malware authors published its source code on GitHub making it easily accessible to hackers
  • Google Cloud Buys the ‘Navy Seals of Cybersecurity’
    Acquisition of Mandiant boosts competitiveness vs. Azure, AWS
  • The San Francisco 49ers
    San Francisco 49ers Reportedly Hit by Ransomware Attack
    Ransomware hacker BlackByte claimed to have stolen financial data from the NFL team and posted it on the dark web
  • Image shows an illuminated laptop computer in the dark
    ScaleUp AI 2022: Hackers Using AI to Penetrate Defenses
    SentinelOne unearths Russian-linked Wiper Attacks targeting satellite internet modems

Leave a comment Cancel reply

-or-

Log in with your IoT World Today account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Related Content

  • Microsoft Ramping up Cybersecurity Service Offerings
  • Thrive Managed Services Acquires InCare Technologies, Plans US Expansion
  • Company Sets New Standards for IoT Device Security
  • IoT Devices Most Vulnerable to Internal Security Threats

Roundups

View all

IoT Product Roundup: PTC, Nokia, Arm and More

19th May 2022

IoT Deals, Partnerships Roundup: Intel, Nauto, Helium and more

14th May 2022

IoT Product Roundup: Amazon, Synaptics, Urban Control and More

27th April 2022

White Papers

View all

The Role of Manufacturing Technology in Continuous Improvement Ebook

6th April 2022

IIoT Platform Trends for Manufacturing in 2022

6th April 2022

Latest Videos

View all
Dylan Kennedy of EMQ

Embedded IoT World 2022: Dylan Kennedy of EMQ

Dylan Kennedy, EMQ’s VP of global operations, sat down with Chuck Martin at Embedded IoT World 2022.

Embedded IoT World 2022: Omdia’s Sang Oh Talks Vehicle Chip Shortage

Omdia’s automotive semiconductor analyst sits down with Chuck Martin at this year’s event

E-books

View all

How Remote Access Helps Enterprises Improve IT Service and Employee Satisfaction

12th January 2022

An Integrated Approach to IoT Security

6th November 2020

Webinars

View all

Rethinking the Database in the IoT Era

18th May 2022

Jumpstarting Industrial IoT solutions with an edge data management platform

12th May 2022

AI led Digital Transformation of Manufacturing: Time is NOW

9th December 2021

Special Reports

View all

Omdia’s Smart Home Market Dynamics Report

7th January 2022

Cybersecurity Protection Increasingly Depends on Machine Learning

28th October 2020

IoT Security Best Practices for Industry and Enterprise

20th October 2020

Twitter

IoTWorldToday, IoTWorldSeries

The U.S. Army is getting a 5G boost for #AR #VR capabilities from #5G network provider @OceusNetworks.… twitter.com/i/web/status/1…

24th May 2022
IoTWorldToday, IoTWorldSeries

@IoTWorldSeries and The #AISummit will be hosted this year in Silicon Hills, the tech hub of Austin, Texas. Acces… twitter.com/i/web/status/1…

24th May 2022
IoTWorldToday, IoTWorldSeries

Hannover Messe 2022: @BoschGlobal,@BostonDynamics robotics showcased. @hannover_messe dlvr.it/SQzhr1 https://t.co/vHWRmsIGcm

24th May 2022
IoTWorldToday, IoTWorldSeries

📣JUNE DIGITAL SYMPOSIUM Drive your strategy forward and stay on the #Healthcare and #IndustrialIoT pulse with key… twitter.com/i/web/status/1…

24th May 2022
IoTWorldToday, IoTWorldSeries

Hyundai Investing $5B on Autonomous Driving and Robotics dlvr.it/SQzfZh https://t.co/1Jyr4Xlord

24th May 2022
IoTWorldToday, IoTWorldSeries

Partner with @IoTWorldToday to reach your prospects and accomplish your goals in 2022. Download our 2022 IoT Mark… twitter.com/i/web/status/1…

24th May 2022
IoTWorldToday, IoTWorldSeries

Explore Emerging Tech For Enterprises at @TechXLR8 2022 this June ➡️ Join us from 1-3 June in harnessing the pow… twitter.com/i/web/status/1…

24th May 2022
IoTWorldToday, IoTWorldSeries

Clearview AI has been fined $9.4 million for collecting images of people from social media platforms to add to its… twitter.com/i/web/status/1…

24th May 2022

Newsletter

Sign up for IoT World Today newsletters: vertical industry coverage on Tuesdays and horizontal tech coverage on Thursdays.

Special Reports

Our Special Reports take an in-depth look at key topics within the IoT space. Download our latest reports.

Business Resources

Find the latest white papers and other resources from selected vendors.

Media Kit and Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • IoT World Series
  • Channel Futures
  • RISC-V
  • Dark Reading
  • ITPro Today
  • Web Hosting Talk

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Login/Register

FOLLOW IoT World Today ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookies Policy
  • Terms
Copyright © 2022 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X