Infoblox research finds explosion of personal and IoT devices on enterprise networks introduces immense security risk
- A quarter of US employees are unclear as to whether their organization has an IoT security policy
- 20 percent of UK employees rarely or never follow security policy for personal and IoT devices
Infoblox Inc., the network control company that provides Actionable Network Intelligence, today announced new research that exposes the significant threat posed by shadow devices on enterprise networks.
The report titled “What is lurking on your network: Exposing the threat of shadow devices” found that enterprise networks across the US, UK and Germany have thousands of shadow personal devices – such as laptops, kindles and mobile phones – and Internet of Things (IoT) devices – such as digital assistants and smart kitchen appliances – connecting to their network.
Over a third of companies in the US, UK and Germany (35 percent) reported more than 5,000 personal devices connecting to the network each day. Employees in the US and UK admitted to connecting to the enterprise network for a number of reasons, including to access social media (39 percent), as well as to download apps, games and films (24 percent, 13 percent and 7 percent respectively). These practices open organizations up to social engineering hacks, phishing and malware injection.
Conversely, just 16 percent of IT directors in the UAE reported having more than 500 personal devices connecting to their networks.
A third of companies in the US, UK and Germany have more than 1,000 shadow IoT devices connected to their network on a typical day, with 12 percent of UK organizations reporting having more than 10,000.
The most common devices found on enterprise networks included:
- Fitness trackers, such as FitBit or Gear Fit – 49 percent
- Digital assistants, such as Amazon Alexa and Google Home – 47 percent
- Smart TVs – 46 percent
- Smart kitchen devices, such as connected kettles or microwaves – 33 percent
- Games consoles, such as Xbox or PlayStation – 30 percent
Such devices are easily discoverable by cybercriminals online via search engines for internet-connected devices, like Shodan, which provides even lower level criminals with an easy means of identifying a vast number of devices on enterprise networks that can then be targeted for vulnerabilities. For example, in March 2018:
- There were 5,966 identifiable cameras deployed in the UK
- There were 2,346 identifiable Smart TVs deployed in Germany
- There were 1,571 identifiable Google Home deployed in the US
To manage the security threat posed by shadow personal devices and IoT devices in the network, 82 percent of organizations have introduced a security policy for connected devices. However, IT directors appear misguided in their estimation for how effective these policies are.
While 88 percent of the IT leaders that responded to the survey believe that their security policy is either effective or very effective, nearly a quarter of employees from the US and UK that we surveyed (24 percent) did not know if their organization had a security policy.
Of those that reported that their organization did have a security policy for connected devices, 20 percent of UK respondents claimed they either rarely, or never, follow it. And, only one fifth of respondents in the US and UK reported that they followed it by the book.
Gary Cox, Technology Director, Western Europe at Infoblox commented: “Due to the poor security levels of many consumer and IoT devices, there is a very real threat posed by those operating under the radar of organizations’ traditional security policies. These devices present a weak entry point for cybercriminals into the network, and a serious security risk to the company.”
“Networks need to be a frontline of defence; second only to having good end user education and appropriate security policies. Gaining full visibility into all connected devices, whether on premise or while roaming, as well as using intelligent DNS solutions to detect anomalous and potentially malicious communications to and from the network, can help security teams detect and stop cybercriminals in their tracks.”
Copper flat wire recycling Copper scrap trade shows Scrap metal remelting
Copper cable recycling news, Metal waste inspection services, Copper scrap refurbishment
Metal shearing services Ferrous material waste treatment Iron and steel scrapping and reutilization
Ferrous waste recycling plant, Iron recycling and salvage, Scrap metal brokers
Wow, wonderful blog layout! How long have you been blogging for? you make blogging look easy. The overall look of your site is fantastic, let alone the content!
Excellent article! We will be linking to this great post on our site. Keep up the good writing.
Hey there I am so happy I found your site, I really found you by error, while I was researching on Google for something else, Nonetheless I am here now and would just like to say thanks a lot for a marvelous post and a all round thrilling blog (I also love the theme/design), I dont have time to read through it all at the minute but I have book-marked it and also included your RSS feeds, so when I have time I will be back to read much more, Please do keep up the superb b.
медицинский центр здорового образа жизни медицинская справка купить купить справку с доставкой
My brother suggested I would possibly like this blog. He used to be totally right. This post actually made my day. You cann’t believe just how so much time I had spent for this information! Thank you!
Francisk Skorina Gomel State University
Hi there, its pleasant piece of writing about media print, we all understand media is a wonderful source of information.
Wow, this post is pleasant, my sister is analyzing such things, thus I am going to let know her.
This is very interesting, You are a very skilled blogger. I have joined your feed and look forward to seeking more of your magnificent post. Also, I have shared your web site in my social networks!
I’m not sure where you are getting your info, but good topic. I needs to spend some time learning more or understanding more. Thanks for wonderful information I was looking for this information for my mission.
Hello there, just became aware of your blog through Google, and found that it is really informative. I’m gonna watch out for brussels. I will appreciate if you continue this in future. Many people will be benefited from your writing. Cheers!
Hello would you mind stating which blog platform you’re working with? I’m looking to start my own blog in the near future but I’m having a difficult time making a decision between BlogEngine/Wordpress/B2evolution and Drupal. The reason I ask is because your design and style seems different then most blogs and I’m looking for something completely unique. P.S Apologies for getting off-topic but I had to ask!
I used to be recommended this website via my cousin. I am now not sure whether this post is written by means of him as no one else understand such particular approximately my difficulty. You are amazing! Thank you!
If you desire to increase your experience only keep visiting this site and be updated with the most recent gossip posted here.
Hi there i am kavin, its my first time to commenting anywhere, when i read this article i thought i could also make comment due to this sensible article.
Ищете надежного партнера для строительства автомойки? У нас есть качественные решения под ключ, чтобы сделать ваш проект прибыльным.
Wow, awesome blog layout! How long have you been blogging for? you make blogging look easy. The overall look of your web site is fantastic, let alone the content!
I’m not sure where you are getting your info, but good topic. I needs to spend some time learning more or understanding more. Thanks for magnificent information I was looking for this information for my mission.
It’s in point of fact a nice and helpful piece of information. I’m satisfied that you shared this helpful info with us. Please stay us informed like this. Thanks for sharing.
Step into the battle arena – Show off your skills and win big Lucky Cola