Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Zscaler Annual IoT Report Identifies Shift in Shadow IoT Behavior Threatening Enterprise Security Posture

1,500 Percent Increase in IoT Traffic Through the Zscaler Cloud Highlights Dangerous Rise in Unauthorized Devices Brought into the Workplace

Zscaler, Inc., the leader in cloud security, announced the release of the company’s second annual Internet of Things (IoT) report, IoT Devices in the Enterprise 2020: Shadow IoT Threat Emerges. Zscaler customers are now generating more than 1 billion IoT transactions per month in the Zscaler cloud, which amounts to a 1,500 percent increase since Zscaler’s May 2019 report. By analyzing two weeks of this traffic through Zscaler cloud, Zscaler found 553 different IoT devices across 21 categories from 212 manufacturers.

“We have entered a new age of IoT device usage within the enterprise. Employees are exposing enterprises to a large swath of threats by using personal devices, accessing home devices, and monitoring personal entities through corporate networks”

Organizations around the world are observing this Shadow IoT phenomenon, where employees are bringing unauthorized devices into the enterprise. With this onslaught of unknown and unauthorized devices, IT and security teams often won’t know these devices are on the corporate network nor how they impact an organization’s overall security posture.

Recommended AI News: Firetinas: The AI Weapon Against Corona Virus in China

Key Findings:

  • Unauthorized IoT Devices on the Rise: The top unauthorized IoT devices Zscaler observed include digital home assistants, TV set-top boxes, IP cameras, smart home devices, smart TVs, smart watches, and even automotive multimedia systems.
  • Manufacturing & Retail Industries Top IoT Traffic Volume: Manufacturing and retail customers generated the highest IoT traffic volume (56.8%) followed by enterprises (23.7%), entertainment and home automation (15.7%), and healthcare (3.8%).
  • Majority of IoT Transactions are Insecure: 83 percent of IoT-based transactions are occurring over plain-text channels, whereas only 17 percent are using secure (SSL) channels.
  • Exponential Increase of IoT Malware: Zscaler blocked 14,000 IoT-based malware attempts per month. That number has increased more than seven times than the May 2019 research.
  • New Exploits Emerging to Target Unauthorized Devices: New exploits that target IoT devices are popping up all the time, such as the RIFT botnet, which looks for vulnerabilities in network cameras, IP cameras, DVRs, and home routers.

Recommended AI News: DeepSig Raises $5 Million Series a Financing to Advance AI in 5G Radio Access Networks

“We have entered a new age of IoT device usage within the enterprise. Employees are exposing enterprises to a large swath of threats by using personal devices, accessing home devices, and monitoring personal entities through corporate networks,” said Deepen Desai, Vice President of Security Research, Zscaler. “As an industry, we need to implement security strategies that safeguard enterprise networks by removing shadow IoT devices from the attack surface while continuously improving detection and prevention of attacks that target these devices.”

Over the quarter, Zscaler blocked approximately 42,000 transactions which were IoT-based malware and exploits. The top malware families included Mirai, Gafgyt, Rift, Bushido, Demonbot and Pesirai. The top destinations connected to by IoT malware families and exploits are the United States, the UK, Russia, The Netherlands and Malaysia.

In response to the growing threat posed by Shadow IoT devices brought into the enterprise, IT organizations must first be able to gain visibility into the existence of unauthorized IoT devices that are already inside the network. Organizations should be considering a Zero Trust approach that ensures any communication between devices and people is with known entities and is within your organization’s policy to reduce the IoT attack surface.

Related Posts
1 of 40,660

Comments are closed, but trackbacks and pingbacks are open.