How Shadow IoT Is A Formidable Threat To Corporate Networks?

As more and more employees bring their connected devices to their workplaces, these devices, called “Shadow IoT” create new security vulnerabilities within organizations.

As employees multiply the connected devices they bring to their workplaces, the threat grows for the security of their corporate networks. By bringing their own connected devices to their workplace, employees are indeed putting the organizations that employ them at risk, as their security teams are not always aware that these devices are connected to the network.

This phenomenon, dubbed the “Shadow IoT”, is based on the success of the Internet of Things and on the proliferation of connected objects sold to the general public. Every day, more and more people are indeed equipped with connected devices, such as fitness monitoring devices, smartwatches or even medical devices.

It very often happens that they connect these objects to the network of their workplace, without however informing the IT departments of the organizations that employ them.

According to the latest figures from security firm Infoblox, almost half of companies (46%) found such “ghost” connected devices on their network last year. Only a quarter of the companies did not find any “Ghost” connected devices on their network.

Minimum Security Standards

The security standards for these connected objects are often faulty or in any case less strict than for other products such as smartphones or laptops. In many cases, manufacturers of connected devices are known to deliver very insecure devices. Sometimes these products never receive a patch, either because the user doesn’t know how to apply it, or because the company never publishes it.

Connected devices are not only potentially vulnerable to setting up a botnet but, connected to corporate networks, they could serve as an entry point for attackers who could use them as additional leverage.

To protect against the threat of Shadow IoT, the report reports that companies are making sure they fully understand devices connected to the network and that they can easily identify suspected or unknown web traffic. Any device connected to the network should also avoid using standard passwords.

TechSmashers
Tech Smashers is a global platform thatprovides the latest reviews & newsupdates on Technology, Business Ideas, Gadgets, Digital Marketing, Mobiles,Updates On Social Media and manymore up coming Trends.

RECENT POSTS

Thinking About Being A Temp, Here’s Everything You Need To Know

Intro Temporary or short-term work might assist you to bridge the gap between works or educate you for a full-time position. Understanding the types of...

5 Reasons Why You Should Have A Contract Management System

Contract management is a difficult and demanding process for any company. A basic contract expiry inquiry or the need to identify the newest contract...

The Role Of Data Mining In Predictive Maintenance In The Automotive Industry

The age of networked production brings with it numerous new challenges. One question that companies in the industry in general and in the automotive...

What Are The Differences Between Marketing And Communication

You might have wondered what "Marcom" means if you've heard the acronym used. Simply put, MarCom is the convergence of marketing and communication. MarCom...

How To Post A Video Longer Than A Minute On Instagram?

Don't know how to share long videos on Instagram—interested in posting videos longer than a minute on the social network? Are you wondering about...

10 Tips For A balance In Better Work-Life

Work and family - how to get both under one roof is no longer just a question of women. In many jobs, the boundaries...

Significant Reasons To Hire A Digital Marketing Agency

Well, you’ve finally set to online tools to grow your business, right? But, watching your shortlisted selling choices, you’ve got SEO, email, PPC, social...

How To Drive Traffic To Your Website

One of the easiest ways to attract new business is to increase visitors to your website. Increasing traffic to your website can be the...