Conducted by Spiceworks, the study surveyed 400 IT professionals in the U.S., Canada and the UK at companies with at least 500 employees across 22 industries. Respondents are all involved with IoT strategies and decisions at their organisations.
While cybersecurity remains the top concern (40 percent), it is a desire for increased physical security that is the top driver for IoT adoption (32 percent), followed by improved operational processes (23 percent), reduced operational costs (21 percent) and simplified management (20 percent). Approximately 71 percent of respondents who already use IoT technologies say they’re using it for building security, often through security cameras.
Recent botnet attacks have infected millions of IoT devices. However, despite the growing security threat associated with IoT, the research shows that about half of the organisations surveyed are deploying IoT solutions on their existing enterprise network and 57 percent prefer to manage their own IoT device security.
“Following the spread of IoT botnets like Reaper and Mirai, which infected millions of internet-connected security cameras, routers, and digital video recorders, it’s evident that insecure IoT devices, even connected security devices, are putting organisations more at risk,” said Peter Tsai, senior technology analyst at Spiceworks. “Before deploying network-connected devices that create more entry points for hackers to exploit, organisations should vet the security of all IoT devices they plan to introduce and ensure their company can adequately protect these devices from potential threats.”
“Our new ‘State of IoT’ report highlights a looming issue within commercial IoT deployments – cross-contamination. Companies that deploy IoT devices on their existing enterprise networks are significantly expanding their attack surface and creating new vulnerabilities to IoT-specific threats that traditional security tools are not equipped to handle,” said Ken Hosac, vice president of IoT business development at Cradlepoint. “The good news, however, is that companies can leverage software-defined perimeter technology to spin-up virtual overlay networks, without trained specialists, that isolate IoT devices from existing networks—and other IoT devices, control access and shield them from being Internet-addressable.”