The adoption rate of Internet of Things (IoT) devices, sensors, and applications were staggering prior to COVID-19, and it soared even more thanks in part to the work-from-anywhere model so many organizations adopted in response to the pandemic. This doesn’t mean that risk managers should shy away from this growing security risk.
A recent IoT security report from Palo Alto Networks indicates that an estimated 1.1 billion IoT physical security endpoints were deployed in enterprise environments at the end of last year. Another 1.4 billion IoT endpoints were used in enterprise utilities applications last year, and Gartner projects that the total number of IoT endpoints across all enterprise segments will surpass 5.8 billion by the end of this year.
An IoT endpoint refers to the computing device that performs a task or function as part of a connected product or service. Examples of endpoints include industrial control and monitoring systems, thermostats, connected vehicles, and that Apple Watch or Fitbit you may be wearing.
While Palo Alto is in the business of selling cybersecurity solutions (as the last five pages of its report make clear), it’s survey-driven research and guidance on identifying, categorizing, and addressing IoT security risks contains practicable insights regardless of your IoT security vendor preference.
The report distinguishes among different categories IoT security challenges, including:
The report also presents a 5-stage lifecycle approach to IoT security through which:
1) Assets are identified and understood;
2) IoT risks are assessed;
3) Risk reduction policies are applied;
4) Known threats are prevented; and
5) Unknown threats are detected and addressed.
The excellent report concludes with a look at five considerations (each with a spot-on checklist of related functionalities to consider implementing) prospective buyers of IoT security solutions should evaluate.