Attend IT Blog

Attend IT Limited has been serving the Brentford area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Insecurity of IoT Devices is a Serious Concern… So Why Aren’t Businesses Worried?

The Insecurity of IoT Devices is a Serious Concern… So Why Aren’t Businesses Worried?

The IoT, or Internet of Things, is everywhere. There’s a relatively good chance that a device that would be part of the IoT is within your reach right now, perhaps even on your person. Businesses of all kinds use the IoT for various purposes as well, but behind this usage lies significant risk from cyberthreats, and a shocking number of businesses seem to accept this risk without much concern… as in, the vast majority of surveyed businesses utilizing the IoT demonstrated a lack of protection, but seemed not to be bothered by it.

Let’s examine the numbers, and discuss why you need to take a different approach.

Companies are Complacent About Connected Devices

On October 10th, IoT security firm Keyfactor and market research firm Vanson Bourne released a study that revealed as much, as its results ultimately suggested that many businesses putting the IoT to use had reached what they saw as an “acceptable” level of protection—despite 89% of respondents reporting cyberattacks against their connected devices.

The issue here is apparent… particularly when 90% of those surveyed professionals reported being victimized within the past year by cyberattacks involving the IoT. Making things worse,70% of respondents had seen increases in IoT-based attacks—half of which experiencing phishing, with malware and ransomware coming in just behind.

Despite all this, a feeling of complacency persists amongst many businesses, with “enough” security being put in place, not all that is potentially available.

IoT Security Issues Can Have Significant Financial and Compliance Ramifications

The research that Keyfactor conducted demonstrated that breaches enabled by the IoT cost—on average—$236,035 per year for the affected businesses, which drastically cuts into the funds available to make these devices more secure. If a company were to suffer more than one such event, the outcome could be extremely bleak.

Historically, many IoT devices have lacked the means to update the onboard protections they have against threats, and that issue is compounded by a combination of bad habits and simple unawareness. Many people postpone security updates, which we do not recommend, and a lot of people don’t think about updating devices that are a part of the IoT. That’s also assuming that the manufacturers of these devices have the systems in place to update them, which many don’t with little in place to regulate them.

Fortunately, the Cybersecurity and Infrastructure Security Agency (CISA) and National Institutes of Standards and Technology (NIST) are collaborating to create guidelines, and some guidelines have been codified into law (albeit only applying to companies supplying the government with IoT devices). Certain states and industries have also had laws adopted to contend with these challenges as well.

What You Can Do to Avoid These Threats

The long and the short of it is that you need to prioritize working with technology of ALL kinds, IoT and otherwise, that can be reliably updated and kept secure. It also doesn’t hurt to engage in various cybersecurity protections and safeguards, leaning on vendors and service providers like Attend IT Limited.

If you’d like to find out more about how we can help you secure your infrastructure as a whole, reach out to us at 020 8626 4485.

The Cloud Has Everything!
Microsoft’s Project Silica Aims to Address Long Te...
 

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Business Computing Productivity Network Security Cloud Best Practices Tip of the Week Business Managed IT Services Data Backup Data Hackers Data Recovery IT Support IT Services communications Disaster Recovery Hosted Solutions Innovation VoIP Privacy Cybersecurity Software Mobile Devices Backup Efficiency Malware Small Business Internet Saving Money Email Business Continuity Cloud Computing Phishing Business Management Collaboration Computer Hardware Outsourced IT BDR Microsoft User Tips Productivity Automation Information Technology Smartphones IT Support Internet of Things Ransomware Workplace Tips Compliance Users Workplace Strategy Artificial Intelligence Quick Tips Smartphone Upgrade Server Wi-Fi Risk Management Communication Managed IT Covid-19 Spam Employee-Employer Relationship Mobile Device Management Managed IT services Network Meetings Mobility Budget Gadgets Managed Service Provider BYOD Wireless Google Human Resources Save Money Networking Mobile Device Training Remote Password Windows 7 Avoiding Downtime Remote Workers Printing Android Document Management Passwords Project Management Virtual Private Network Information History MSP Instant Messaging Remote Work VPN Computers Hosted Solution Windows 10 Help Desk Firewall Microsoft Office Social Media Remote Computing Router Video Conferencing Content Filtering Chrome Cost Management Monitoring Managed Service Data Management Time Management Value Backup and Disaster Recovery Printers Mobile Office Telephony Hybrid Cloud Solid State Drive Big Data Marketing Software as a Service Office Recovery Conferencing Printer Automobile Saving Time Data Breach Business Technology Data Security Personal Information Maintenance Laptop Employer-Employee Relationship Redundancy Government Wireless Internet Tech Term Mobile Customer Relationship Management Telephone Systems Computing Machine Learning Managed Services Data Storage Hacker Current Events AI Voice over Internet Protocol End of Support Encryption IT Service Paperless Office Manufacturing Hard Drives Devices Proactive Audit Management Commerce Troubleshooting Social Engineering Paperless Solutions Cybersecurty Shadow IT Smart Tech Vendor Spyware Upgrades Smartwatch Computer Repair Advertising Students Utility Computing Workstations Customer Service Cabling Business Intelligence Windows Server 2008 Update IoT Finance SMB Active Directory Break/Fix Window 10 Windows Legal Financial Technology File Sharing Remote Working Development CRM Antivirus Vendor Management Dark Web Downtime Connectivity Apple Inventory Management Unified Communications Files Copier WPA3 PCI DSS App Employees Administration Infrastructure Windows Server Transportation Microsoft 365 Evernote Hiring/Firing Online Storage Education Wireless Technology Cleaning Storage intranet Holiday Wasting Money E-Commerce Streaming Media User Error Employer/Employee Relationships PDF Work/Life Balance Remote Monitoring Phone System File Storage Word Regulations Compliance SaaS Managed IT Service Copiers Colocation Hacking Proactive IT Private Cloud Videoconferencing Vulnerability Regulation Going Green RMM OneNote Money Application Mobile Computing Applications Leadership Entertainment Samsung Amazon Nanotechnology Payment Cards Disaster Content Filter Data Loss Cost Data Protection Office 365 Black Market Payroll Bandwidth Going Paperless Voiceover Internet Protocol Save Time Smart Technology Gamification Streaming Analysis Virtual Assistant Professional Services Workers Windows 11 Battery Flexibility Two-factor Authentication Telephone Blockchain How To HIPAA Outsource IT iPhone Electronic Medical Records Outsourcing Regulations Virtualization Analytics Chromebook Browser Business Telephone Windows 10 Cybercrime The Internet of Things Company Culture Alexa for Business Strategy Travel e-waste Fiber Optics Facebook Lifestyle Bitcoin Microsoft Outlook Azure Operating System Adobe Wireless Charging Internet Service Provider Windows 8.1 Augmented Reality Facebook Privacy Health Safety Microsoft Excel Innovations Remote Management Office Tips Computer Fan Procedure Healthcare Cast Identity Theft Websites HaaS Politics Charger Mobile Security Cameras Tablets Microsoft Word Business Strategy YouTube Internet Exlporer Gmail Wasting Time Legislation Hard Disk Drive Shortcut WannaCry Voice Managing Stress Emergency Miscellaneous Telephone System Proactive Management Myths Social USB Books Tech Support Organization Consultant Server Maintenance Inventory Worker Commute Scam Keyboard Shortcuts Gifts Data Theft Experience Identity Digital Cameras NFL Environment Holidays Humor PowerPoint Accessory Comparison Language Excel Licensing Workstation Television CrashOverride 5G Search Display Reviews Print Emails IT Solutions Keyboard Net Neutrality Work Computer Care Threats Virtual Reality Testing Fraud HBO Investment Communitications Best Practice 2FA Processor Data Privacy Mixed Reality eWaste Workplace Strategies OneDrive How To Peripheral Specifications Security Cameras eSignature Telework Medical IT Worker Google Assistant Co-Managed Services Sports IT budget Database Webinar WIndows Server 2008 Micrsosoft Unsupported Software Scams Relocation Camera Google Drive Edge SSD Touchscreen ROI Hosted Desktop Apps Financial Virtual Desktop Credit Cards Benchmarks Law Enforcement Music Hard Drive Windows Ink Device Security WiFi Sabotage Access Control Sales Virus iOS Sync Cyberattack Audits eCommerce Twitter Alert Cortana Biometrics IT solutions Patch Management Digital Signage FAQ Authentication Root Cause Analysis Employee Managed Services Provider Video Games Projects Google Docs Ciminal IT Management Windows Server 2008 R2 Smart Devices Text Messaging Computer Accessories Bring Your Own Device Reputation Google Maps Policy Print Management Unified Threat Management Screen Mirroring PC Memory Admin Retail Computer Tips App store Robot Updates Solutions Supply Chain Settings Point of Sale Scalability Computer Forensics Hyperlink Identities Windows 10s Outlook