43% of enterprises do not have adequate IoT platform protection

A recent Kaspersky report revealed that some parts of the IoT (Internet of Things) infrastructure of 43% of enterprises still do not have any protection measures in place.

According to IoT Analytics, the number of connected IoT devices globally is expected to grow by 9%, reaching 27 billion IoT connections by 2025. The significant increase in connected devices also increases demand. security requirements. In fact, Gartner highlights, over the past three years, nearly 20% of organizations have observed cyberattacks on IoT devices in their network.

While two-thirds of organizations (64%) globally use IoT solutions, 43% do not fully protect them. This means that for some IoT projects – be it anything from EV charging stations to connected medical devices – businesses are not using any protection tools.

The reason behind this may be due to the variety of IoT devices and systems that are not always compatible with security solutions . Nearly half of enterprises fear that cybersecurity products may affect IoT performance (46%) or be too difficult to find the right solution (40%). Other common problems businesses face when implementing cybersecurity tools are high costs (40%), inability to explain investment projects to the board (36%) and lack of staff IoT security officer or expert (35%).

Additionally, more than half of organizations (57%) cite cybersecurity as a major barrier to IoT implementation. This can happen when companies try to address cyber risks at the design stage and then have to carefully weigh all the pros and cons before doing so.

To help organizations fill the gaps in their IoT security, Kaspersky recommends the following approaches:

  • Assess the security state of the device before deployment. Priority should be given to devices with network security certificates and products of manufacturers that focus on information security.
  • Use . strict access policy, network segmentation and Zero Trust model This will help reduce the spread of an attack and protect the most sensitive parts of the infrastructure.
  • Apply vulnerability management to regularly get the most relevant data about vulnerabilities in programmable logic controllers (PLCs), devices and firmware, and patch them or use any protection solutions any.
  • Check out the “IoT Security Maturity Model” – an approach that helps companies assess all the steps and levels they need to go through to achieve full IoT protection .

Related posts

New zero-day vulnerability is threatening all versions of Windows

Hackers claim to ‘take down’ Microsoft’s Windows and Office activation system

Apple was accused of illegally monitoring employees right at home