Survey: Less Than Half of IT Leaders are Confident in their IoT Security Plans

Viakoo recently released findings from its 2024 IoT Security Crisis: By the Numbers. The survey uncovers insights from IT and security executives, exposes a dramatic surge in enterprise IoT security risks, and highlights a critical missing piece in the IoT security technology stack. The clarion call is clear: IT leaders urgently need to secure their IoT infrastructure one application at a time in an automated and expeditious fashion.

Increased IoT Security Threats

IoT application and device systems are critical to the profits and operations of many organizations. As cybersecurity threats grow, IoT systems remain vulnerable due to missing pieces in enterprises' current technology stack. In surveying IT leaders across a range of organizations, it's clear that poor IoT security is causing serious issues:

  • 95% of IT leaders have an IoT security plan in place, but only 51% feel confident in their efforts.
  • 55% of IoT cyber incidents could have been prevented with better security measures.
  • 50% of IT leaders say IoT is the weakest part of their security.
  • 50% of companies have experienced an IoT cyber incident in the last 12 months, of which 44% were serious, and 22% threatened business operations.

The Right Technology Stack for IoT Security

IT leaders are focused on improving IoT security, but their current technology security stack is missing key pieces:

  • 90% of IT leaders believe that agentless security solutions are the foundation for successful IoT security.
  • 93% of IT leaders use agentless network-based asset discovery to help remediate IoT vulnerabilities, but only 35% feel they are successful with these efforts.
  • Over two-thirds (71%) of IT leaders wish they started their IoT security plans differently so they could remediate vulnerabilities faster.
  • 83% of IT leaders agree their attack surface grew one application at a time, and should be remediated one application at a time

"The IoT attack surface was built one application at a time and is growing one application at a time," said Bud Broomhead, CEO of Viakoo. "Viakoo's 2024 IoT Security Crisis: By the Numbers findings reinforce the criticality of securing IoT infrastructure one application at a time in an automated and rapid fashion."

Growing Investment, Lack of Confidence

IT professionals recognize the threat IoT presents to their business. Based on the survey results, the top emerging IoT threats for IT professionals include data breaches (69%), ransomware attacks (60%), supply chain attacks (45%), and Denial of Service (DDoS) attacks (42%).

IT leaders plan to increase spending on security stacks in the following year, but lack the knowledge and confidence to make informed decisions on filling security blind spots:

  • 87% of companies spent more on IoT security in 2023 compared to 2022.
  • 89% of companies plan to spend more on IoT security in 2024 compared to 2023.
  • Only 63% of Boards feel they have enough information on IoT security to make informed decisions.

The numbers presented here spotlight how the IoT applications and device systems that organizations rely on are vulnerable, are being attacked, and lack the focus on cybersecurity that traditional IT systems have. While there is board-level visibility into IoT security and internal discussions between the managers of IoT systems, most organizations lack the proper technology solutions, reporting, and governance to ensure that IoT systems are always visible, operational, and secure.

Download the full report here.

Featured

  • Security Today Announces 2025 CyberSecured Award Winners

    Security Today is pleased to announce the 2025 CyberSecured Awards winners. Sixteen companies are being recognized this year for their network products and other cybersecurity initiatives that secure our world today. Read Now

  • Empowering and Securing a Mobile Workforce

    What happens when technology lets you work anywhere – but exposes you to security threats everywhere? This is the reality of modern work. No longer tethered to desks, work happens everywhere – in the office, from home, on the road, and in countless locations in between. Read Now

  • TSA Introduces New $45 Fee Option for Travelers Without REAL ID Starting February 1

    The Transportation Security Administration (TSA) announced today that it will refer all passengers who do not present an acceptable form of ID and still want to fly an option to pay a $45 fee to use a modernized alternative identity verification system, TSA Confirm.ID, to establish identity at security checkpoints beginning on February 1, 2026. Read Now

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.