PUBLISHER: IDC | PRODUCT CODE: 1912158
PUBLISHER: IDC | PRODUCT CODE: 1912158
The explosive growth of the Internet of Things has led to a proliferation of low-cost, networked devices in industrial, corporate, medical, and home settings. While these systems offer convenience and ease of deployment, they often impose long-term burdens on IT security programs. Sophisticated attackers exploit IoT vulnerabilities to steal sensitive data, disrupt operations, or gain a foothold for targeting other systems. The risk is not limited to malicious behavior either; well-intentioned users who utilize these devices in the wrong context can inadvertently capture and mishandle sensitive data and cause serious compliance and regulatory issues.Because IoT risk cannot be fully eliminated, it must be managed through assessment work, security baselines and system hardening, vulnerability management, and detection and response. This paper examines emerging threats, common issues that exacerbate them, and the specific areas of IT security programs most challenged by IoT adoption. We also highlight the importance of vendor vetting within third-party risk management, and the role of market pressures in shaping product quality.Our discussion is informed by breaches that have occurred in the last two years. Recent developments include large-scale supply chain attacks and abuse of physical controls in OT systems. Organizations considering adoption of this technology will gain key assessment tools to vet these products and systems and integrate them securely into their enterprises. Teams already supporting or inheriting these devices will find actionable guidance to assess and treat the risks involved."Abuse of the monitoring and physical control capabilities of IoT solutions can expose organizations beyond utilities and manufacturing to risks that IT security programs have not previously had to contend with. To ensure safe deployment and use, it is essential to understand potential failure modes, hold vendors accountable, and implement security controls that are at least as strong as those protecting other IT assets." - Joel Sandin, adjunct research advisor, IT Executive Programs, IDC