6 Myths About IoT Security

There’s every reason to be concerned about the potential of an IoT system, sensor, or device being hacked in the enterprise or a user’s home office. These devices regularly are exposed for their vulnerabilities, and most are not built with security in mind. An attack via an IoT device can blindside an organization: Take the hotel in Las Vegas last year that lost data when a hacker made his way on to the network through a high-tech fish tank.

Over time, just about every household appliance and piece of office equipment will have an IP address, which means it will be potentially open to hackers.

Forrester’s Merritt Maxim says 92% of global technology decision-makers with more than 1,000 employees say they have security policies in place for their firm’s use of IoT devices and solutions. However, only 47% consider their security tools sufficient. A full 34% consider their security tools insufficient and another 10% say they do not have security tools to enforce their IoT security policies.

Read about 6 common myths regarding securing IoT devices and systems on DarkReading.

Track the strategic threats to your business with the Threat Brief, delivered to your email daily.

Subscribe Here