By Joe Lea, VP of Product
We’ve come a long, long way since the first IoT device – reportedly a 1980s Arpanet-connected Coca-Cola dispenser at Carnegie Mellon University in Pittsburgh. But that thirst for a cold beverage opened the door to technologies that would change the world.
Today’s enterprises are awash in IoT, or perhaps more appropriately, an Enterprise of Things. Businesses today rely on devices like video conferencing equipment and digital whiteboards, smart TVs and HVACs, and industry-specific devices like connected medical equipment that deliver patient care or internet-connected forklifts and smart city networks.
These devices improve convenience, efficiency, and safety, but they also introduce risks most businesses aren’t thinking about, but that really ought to be on their radar. And nobody wants to be left holding the bag when you-know-what hits the IoT fan.
In this SHIoT HAPPENS blog series, we’ll share real stories of Internet-connected devices – unmanaged devices – including real-life examples from recent headlines and insider stories from actual security professionals. We hope this information will shine a spotlight on the widespread problem of unseen, unmanaged, and unsecured connected devices in the workplace.
Read more in our ongoing SHIoT HAPPENS blog series:
- CT Scanner Patient Zero for WannaCry?
- Are Vending Machines Snacking on Your Coporate Data?
- Can a Digital Microscope Be a Victim of WannaCry?
- A $750 Billion Tech Giant Has Hackable Badge Readers?
- Could a Hacker Weaponize Your Printer?
- Have Hackers Pwned Your Access Points?
More Connected Devices Than Ever Before
The number of connected devices in the workplace is exploding. As one CISO of a Fortune 100 company said to us, “I actually struggle to find devices that are not Internet connected.” The data shows that unmanaged and IoT devices are overtaking the managed devices. We find that most businesses can’t see 40% of the devices in their environment. Sometimes the business brings in these devices; sometimes it’s employees or vendors.
Unlike traditional managed devices like laptops and PCs, these unmanaged devices are new endpoints filled with new exploits hackers can use to penetrate your perimeter. They lack any inherent security capabilities, can’t be managed or secured using traditional security products, are difficult or even impossible to keep updated, and their use is increasingly pervasive across every industry.
The Worlds of OT and IT Are Converging
The convergence of conventional machines and smart technologies is blurring the line between where OT ends and IT begins. And while security teams will always struggle with new technologies, some Internet-connected devices aren’t and might not ever be top-of-mind.
A complicated, unseen and unmanaged infrastructure of sensors, actuators, and other gizmos exist today inside everything from vending machines to heart monitors. The pervasiveness of these creates alarming security gaps and enables novel attack vectors most security products weren’t designed to address.
You Can No Longer Ignore The Risk
Security teams can no longer ignore these risks. Data exfiltration at a major casino using a thermostat on a fish tank is real. And even today, the recent power outage at a major airport is
Are you considering the devices your employees are putting on your network? Are you thinking about the future of unmanaged devices and how they affect your security strategy? Are you ready for the onslaught of attacks that could strike on devices you least expected?
Are you ready for when SHIoT HAPPENS?