Security News > 2020 > February > Shadow IoT: A growing threat to enterprise security
Organizations around the world are observing this Shadow IoT phenomenon, where employees are bringing unauthorized devices into the enterprise.
Key findings Unauthorized IoT devices on the rise: The top unauthorized IoT devices include digital home assistants, TV set-top boxes, IP cameras, smart home devices, smart TVs, smart watches, and even automotive multimedia systems.
"We have entered a new age of IoT device usage within the enterprise. Employees are exposing enterprises to a large swath of threats by using personal devices, accessing home devices, and monitoring personal entities through corporate networks," said Deepen Desai, Vice President of Security Research, Zscaler.
"As an industry, we need to implement security strategies that safeguard enterprise networks by removing shadow IoT devices from the attack surface while continuously improving detection and prevention of attacks that target these devices."
In response to the growing threat posed by Shadow IoT devices brought into the enterprise, IT organizations must first be able to gain visibility into the existence of unauthorized IoT devices that are already inside the network.
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/avba5k3Y9Ak/
Related news
- MUT-1244 targeting security researchers, red teamers, and threat actors (source)
- Deloitte says cyberattack on Rhode Island benefits portal carries 'major security threat' (source)
- Are threat feeds masking your biggest security blind spot? (source)
- Week in review: MUT-1244 targets both security workers and threat actors, Kali Linux 2024.4 released (source)
- Cross-Domain Attacks: A Growing Threat to Modern Security and How to Combat Them (source)
- FCC Launches 'Cyber Trust Mark' for IoT Devices to Certify Security Compliance (source)