Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Friday, 27 January, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Trend Micro Survey Finds IoT Deployment Decisions Made Without Consulting Security Teams

by The Gurus
September 6, 2018
in Editor's News
Share on FacebookShare on Twitter

Trend Micro Incorporated, a global leader in cybersecurity solutions, today revealed that organizations around the world are exposing themselves to unnecessary cyber risk by failing to give IT security teams a voice when planning Internet of Things (IoT) project deployments in enterprise environments.

A survey of 1,150 IT and security decision makers in Germany, France, Japan, the UK and US revealed that 79 percent involve the IT department in choosing industrial IoT solutions, but only 38 percent involve their security teams.

“It is remarkable how IT security teams are being locked out of IoT projects, when this is clearly exposing organisations to unnecessary cyber risk,” said Bharat Mistry for Trend Micro. “Our study shows too many organizations across the globe don’t prioritize security as part of their IoT strategy, which leaves them vulnerable. Unless security is addressed as part of the deployment, these devices will remain exposed and vulnerable since, for the most part, they were not designed to be updated or patched.”

The research found that responding organisations spent more than $2.5 million on IoT initiatives over the past year and plan to spend the same in the next 12 months. Given the heavy financial investment, security should be equally invested in to mitigate risks associated with these connected devices. However, only 56 percent of new IoT projects include the Chief Information Security Officer (CISO) as one of the decision makers in selecting a security solution.

According to IDC, IoT enablement, which may involve connecting consumer-facing industrial control systems to the internet for the first time, exposes software vulnerabilities putting corporate data at risk, but also enabling attackers to target and potentially manipulate software-based safety mechanisms to cause intentional or unintentional physical harm to the public.[1]

Reinforcing these known issues, the survey found organizations suffering an average of three attacks on their connected devices in the past year. This proves that the risk introduced by insecure IoT devices in a business is actively affecting enterprises around the globe.

Additionally, 93 percent of respondents said they have recognised at least one threat to critical infrastructure resulting from an IoT implementation. The most common reported threats posed by these added connections included complex infrastructure, an increased number of endpoints, and a lack of adequate security controls.

[1] IDC, IDC FutureScape: Worldwide IoT 2018 Predictions, October 2017

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Top 3 Issues at Gartner Security & Risk Management Summit 2018

Next Post

Windows Task Scheduler Zero Day hit by Malware attack

Recent News

#MIWIC2022: Carole Embling, Metro Bank

#MIWIC2022: Carole Embling, Metro Bank

January 26, 2023
Lupovis eliminates false positive security alerts for security analysts and MSSPs

Lupovis eliminates false positive security alerts for security analysts and MSSPs

January 26, 2023
Threat actors launch one malicious attack every minute

Threat actors launch one malicious attack every minute

January 25, 2023
The Salt Security API Protection Platform is Now Available on Google Cloud Marketplace

The Salt Security API Protection Platform is Now Available on Google Cloud Marketplace

January 25, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information