Intelligent CISO Issue 1 - Page 49

A A recent survey shows 64% of organisations have deployed some level of IoT technology and another 20% plan to do so within the next 12 months. This means that by the end of 2018, five out of six organisations will be using at least a minimal level of IoT technology within their businesses. This is an astonishing fact when you consider the lack of basic security on these devices or any established security standards. The influx of connected devices on to a company’s network literally creates tens, or even hundreds, of new unsecured entry points for cybercriminals. But many companies are turning a blind eye to this, swayed by the potential benefits that IoT can bring to their business. So here are some facts for consideration, before taking the leap into IoT, including a look at the short and medium-term consequences of deploying a wave of unsecured devices to your network. IoT: a cybercriminal’s dream Any device or sensor with an IP address connected to a corporate network is an entry point for hackers and other cybercriminals; it’s the equivalent of an organisation leaving its front door wide open for thieves. Managing endpoints within an organisation is already a challenge; a 2017 survey showed 63% of IT service providers have seen a 50% increase in the number of endpoints they’re managing, compared to the previous year. IoT will usher in a raft of new network- connected devices that threaten to overwhelm the IT department charged with securing them, a thankless task considering the lack of basic safeguards in place on the devices. Of particular concern is that many IoT )‘•Ω₯•Μ…Ι”Ή½Π‘•Ν₯Ή•ΡΌ‰”Ν•ΥΙ•)½ΘΥΑ‘…Ρ•…™Ρ•Θ‘•Α±½ε΅•ΉΠΈQ‘₯́΅•…ΉΜ)Ρ‘…Ё…ΉδΩΥ±Ή•Ι…‰₯±₯Ρ₯•Μ‘₯͍½Ω•Ι•Α½ΝΠ΄)‘•Α±½ε΅•ΉΠ…ΉΉ½Π‰”ΑΙ½Ρ•Ρ•……₯ΉΝΠ)₯ΈΡ‘”‘•Ω₯”₯ΡΝ•±˜…Ή½ΙΙΥΑΡ•‘•Ω₯•Μ)έέάΉ₯ΉΡ•±±₯•ΉΡ₯ΝΌΉ½΄)π)%ΝΝΥ”€ΐΔ)QUI)…ΉΉ½Π‰”±•…ΉΝ•Έ%Έ…Έ•ΉΩ₯Ι½Ή΅•ΉΠ)έ₯Ρ ‘ΥΉ‘Ι•‘́½ΘΡ‘½ΥΝ…Ή‘́½˜₯ΉΝ•ΥΙ”)½Θ½ΙΙΥΑΡ•‘•Ω₯•Μ°Ρ‘₯́…ΈΙ…₯Ν”‘՝”)½Α•Ι…Ρ₯½Ή…°…ΉΝ•ΥΙ₯Ρ䁍‘…±±•Ή•ΜΈ)%P½Θ=P)%PΑΙ½™•ΝΝ₯½Ή…±Μ…Ι”΅½Ι”ΥΝ•ΡΌ)Ν•ΥΙ₯ΉœA Μ°±…ΑΡ½Ά…Ή½Ρ‘•Θ‘•Ω₯•Μ°)‰ΥЁё•δέ₯±°Ή½ά‰”•αΑ•Ρ•ΡΌ‰•½΅”)•αΑ•ΙΡ́₯ΈΝ΅…ΙЁ±₯‘Ρ₯Ήœ°‘•…Ρ₯Ήœ…Ή)…₯ȁ½Ή‘₯Ρ₯½Ή₯ΉœΝεΝΡ•΅Μ°Ή½ΠΡΌ΅•ΉΡ₯½Έ)Ν•ΥΙ₯Ρ䁍…΅•Ι…́…Ή₯ΉΡ•Ι…Ρ•™…₯±₯Ρ₯•Μ)΅…Ή…•΅•ΉΠΝεΝΡ•΅ΜΈ)±…¬½˜•αΑ•Ι₯•Ή”₯Έ΅…Ή…₯ΉœΡ‘₯Μ)=Α•Ι…Ρ₯ΉœQ•‘Ή½±½δ€‘=P€°Ι…Ρ‘•ΘΡ‘…Έ)%P°Ν‘½Υ±‰”„…ΥΝ”½˜½Ή•ΙΈΈ%Ё₯Μ)Ν••Έ…́½Α•Ι…Ρ₯½Ή…°Ι…Ρ‘•ΘΡ‘…ΈΝΡΙ…Ρ•₯Œ)…Ή‘•Α±½ε΅•ΉΠ…Ή΅…Ή…•΅•ΉΠ…Ι”)½™Ρ•ΈΝ‘₯™Ρ•έ•±°…݅䁙ɽ΄‰½…ɐ)…έ…Ι•Ή•Ν́…Ή½Ω•ΙΝ₯‘ΠΈ)ΉΡ‘…ΣŠé‰…Ι•±δΡ½Υ‘₯ΉœΡ‘”Ω₯Ν₯‰±”)ΝΥΙ™…”Έ5…‘₯Ή”΅ΡΌ΅΅…‘₯Ή”€‘4Ι4€)Ρ•‘Ή½±½δ₯́…±Ι•…‘δΡΙ…ΉΝ™½Ι΅₯Ήœ…Ή)έ₯±°½ΉΡ₯ΉΥ”ΡΌΡΙ…ΉΝ™½Ι΄‰ΥΝ₯Ή•ΝΝ•ΜΈ)€ΘΐΔ܁ΝΥΙٕ䁙½ΥΉ)Ρ‘…Ё…±΅½ΝЁ‘…±˜½˜)Ν΅…±°‰ΥΝ₯Ή•ΝΝ•Μ)ΕΥ•ΝΡ₯½Ή•έ½Υ±)Α…䁄Ι…ΉΝ½΄½Έ%½P)‘•Ω₯•ΜΈ)5…Ήδ$…ΑΑ±₯…Ρ₯½ΉΜ‘•Α•Ή½Έ)%½P쁙½Θ•α…΅Α±”°ΡΙ…ΉΝΑ½ΙΡ…Ρ₯½Έ…Ή)±½₯ΝΡ₯Μ…Ι”‰•₯Ήœ‘…Ή•‰δ₯ΠΈQ‘•Ν”)‘•Ω•±½Α΅•ΉΡ́…Έ…Ήέ₯±°₯΅Α…Π)΅½ΝЁ½Ι…Ή₯Ν…Ρ₯½ΉΜΈ9•Ω•ΙΡ‘•±•ΝΜ°)Ρ‘”΅…©½Ι₯Ρ䁽˜½Ι…Ή₯Ν…Ρ₯½ΉΜ…Ι”)‘•Α±½ε₯Ήœ%½PΡ•‘Ή½±½δέ₯Ρ Ή½Π)½Ή±δ„±…¬½˜ΝΡΙ…Ρ•₯Œ‘₯Ι•Ρ₯½Έ°‰ΥΠ)έ₯Ρ ΅₯Ή₯΅…°Ι•…ɐΡΌΡ‘”Ι₯Ν¬ΑΙ½™₯±”)½ΘΡ‘”Ρ…Ρ₯…°Ι•ΕΥ₯Ι•΅•ΉΡ́Ή••‘•)ΡΌΝ•ΥΙ”Ρ‘•΄……₯ΉΝЁչ™½Ι•Ν••Έ)½ΉΝ•ΕΥ•Ή•ΜΈQ‘•Ν”₯Ή±Υ‘”Ή½Π©ΥΝΠ)Ν•ΥΙ₯ΡδΙ•ΕΥ₯Ι•΅•ΉΡ́‰ΥЁ…±ΝΌ‰ΥΝ₯Ή•ΝΜ)½ΉΡ₯ΉΥ₯Ρ䁍‘…±±•Ή•ΜΈ(Π