Nearly Half of IoT-to-IT Connections Come from Vulnerable or Misconfigured High-Risk Devices
A recent study has revealed that almost half of all network connections from Internet of Things (IoT) devices to internal IT systems originate from high-risk or vulnerable IoT devices. According to a new report published by Palo Alto Networks, which analyzed telemetry data from 27 million devices, 48.2% of these connections involve devices that are either vulnerable to exploitable flaws or misconfigured, while an additional 4% come from critical-risk components.
### The Growing Threat of High-Risk IoT Devices
These high-risk IoT systems often suffer from unpatched vulnerabilities, weak configurations, or use insecure protocols. This combination creates a broad and persistent attack surface that allows threat actors to move laterally within a network. Once compromised, these devices open direct pathways for cyber threats to spread from IoT endpoints into core business systems, putting sensitive data and operations at risk.
### Why Flat Networks Are a Problem
One of the primary risk factors highlighted is the widespread use of “flat” networks in many enterprises. In these setups, IoT and IT devices coexist on the same network without any isolation. This lack of network segmentation makes it easy for attackers to move laterally after gaining an initial foothold, increasing the scale and impact of a breach.
### How to Stay Safe: Best Practices for Protecting Your Network
To mitigate these risks, both small and medium-sized businesses (SMBs) and larger enterprises should take several proactive steps:
– **Enforce Network Segmentation:** Establish strict segmentation between IoT and IT systems to isolate high-risk or unmanaged devices from critical infrastructure.
– **Implement Zero Trust Architecture:** Apply least-privilege access principles, continuous device verification, and contextual access controls to ensure only authorized users and devices can interact with sensitive systems.
– **Maintain Complete Device Visibility:** Track all devices connected to your network, including unmanaged and Bring Your Own Device (BYOD) assets, to identify vulnerabilities and potential risks promptly.
– **Regular Patching and Firmware Updates:** Perform consistent vulnerability assessments and apply necessary updates to firmware and software to reduce exploitable risks.
– **Deploy Comprehensive Endpoint Protection:** Use Endpoint Detection and Response (EDR) or Extended Detection and Response (XDR) solutions across all managed IT assets. For IoT endpoints unable to run agents, develop alternative monitoring strategies.
### Final Thoughts
A single exploited IoT device can lead to significant consequences such as data theft, business disruption, or substantial financial loss. By adopting strong segmentation, Zero Trust principles, full visibility, and robust monitoring, organizations can strengthen their defenses against increasingly sophisticated cyber threats targeting IoT devices.
—
Stay informed about the latest cybersecurity trends and best practices by following TechRadar. Click the Follow button to receive updates directly.
https://www.techradar.com/pro/security/nearly-half-of-network-connections-come-from-high-risk-iot-and-it-devices-so-make-sure-youre-protected