How Shadow IoT Is A Formidable Threat To Corporate Networks?

As more and more employees bring their connected devices to their workplaces, these devices, called “Shadow IoT” create new security vulnerabilities within organizations.

As employees multiply the connected devices they bring to their workplaces, the threat grows for the security of their corporate networks. By bringing their own connected devices to their workplace, employees are indeed putting the organizations that employ them at risk, as their security teams are not always aware that these devices are connected to the network.

This phenomenon, dubbed the “Shadow IoT”, is based on the success of the Internet of Things and on the proliferation of connected objects sold to the general public. Every day, more and more people are indeed equipped with connected devices, such as fitness monitoring devices, smartwatches or even medical devices.

It very often happens that they connect these objects to the network of their workplace, without however informing the IT departments of the organizations that employ them.

According to the latest figures from security firm Infoblox, almost half of companies (46%) found such “ghost” connected devices on their network last year. Only a quarter of the companies did not find any “Ghost” connected devices on their network.

Minimum Security Standards

The security standards for these connected objects are often faulty or in any case less strict than for other products such as smartphones or laptops. In many cases, manufacturers of connected devices are known to deliver very insecure devices. Sometimes these products never receive a patch, either because the user doesn’t know how to apply it, or because the company never publishes it.

Connected devices are not only potentially vulnerable to setting up a botnet but, connected to corporate networks, they could serve as an entry point for attackers who could use them as additional leverage.

To protect against the threat of Shadow IoT, the report reports that companies are making sure they fully understand devices connected to the network and that they can easily identify suspected or unknown web traffic. Any device connected to the network should also avoid using standard passwords.

TechSmashers
Tech Smashers is a global platform that provides the latest reviews & news updates on Technology, Business Ideas, Gadgets, Digital Marketing, Mobiles, Updates On Social Media and many more up coming Trends.

RECENT POSTS

Streamlining Financial Processes: The Benefits of Modern Accounting Software

In the fast-paced environment of modern business, it is essential to efficiently handle finances. It is key to ensure the prosperity and development of...

Top 5 Best Portable Consoles In 2024

The most recent age compact control center is intended to offer a functional and complete gaming experience with perpetually noteworthy execution. Versatile game control...

How Modern Smartphones Have Revolutionized Journalism

The world has gone entirely digital; everything is now accessible online, from products and services to information. The introduction of technological innovations, such as...

The CIA Did Not Break The Encryption Of WhatsApp, Signal, Or Telegram

If encrypted messaging applications do not appear to be compromised by the CIA, the agency is using numerous techniques to take control of mobile...

Leveraging Customer Opinions to Boost Online Engagement

In the dynamic landscape of digital commerce and information exchange, the power of customer opinions has never been more influential. Today's savvy businesses are...

WiFi: 5 Constraints To Manage When Deploying A Network

The constraints on a WiFi deployment project are incredibly numerous. A necessary phase for any project is to define the need to size the...

How To Install Windows 11/10 On Your Mac With UTM

If you use a Mac equipped with an Apple Silicon (M1, M1 Max, or M2) or Intel (x86/64) processor, you will be delighted to...

The Role Of HR Management In The Digital Transformation Paths Of Organizations

Starting and managing a Digital Transformation path in the company does not only mean equipping yourself with innovative tools and methodologies but also acting...