Survey: Less Than Half of IT Leaders are Confident in their IoT Security Plans

Viakoo recently released findings from its 2024 IoT Security Crisis: By the Numbers. The survey uncovers insights from IT and security executives, exposes a dramatic surge in enterprise IoT security risks, and highlights a critical missing piece in the IoT security technology stack. The clarion call is clear: IT leaders urgently need to secure their IoT infrastructure one application at a time in an automated and expeditious fashion.

Increased IoT Security Threats

IoT application and device systems are critical to the profits and operations of many organizations. As cybersecurity threats grow, IoT systems remain vulnerable due to missing pieces in enterprises' current technology stack. In surveying IT leaders across a range of organizations, it's clear that poor IoT security is causing serious issues:

  • 95% of IT leaders have an IoT security plan in place, but only 51% feel confident in their efforts.
  • 55% of IoT cyber incidents could have been prevented with better security measures.
  • 50% of IT leaders say IoT is the weakest part of their security.
  • 50% of companies have experienced an IoT cyber incident in the last 12 months, of which 44% were serious, and 22% threatened business operations.

The Right Technology Stack for IoT Security

IT leaders are focused on improving IoT security, but their current technology security stack is missing key pieces:

  • 90% of IT leaders believe that agentless security solutions are the foundation for successful IoT security.
  • 93% of IT leaders use agentless network-based asset discovery to help remediate IoT vulnerabilities, but only 35% feel they are successful with these efforts.
  • Over two-thirds (71%) of IT leaders wish they started their IoT security plans differently so they could remediate vulnerabilities faster.
  • 83% of IT leaders agree their attack surface grew one application at a time, and should be remediated one application at a time

"The IoT attack surface was built one application at a time and is growing one application at a time," said Bud Broomhead, CEO of Viakoo. "Viakoo's 2024 IoT Security Crisis: By the Numbers findings reinforce the criticality of securing IoT infrastructure one application at a time in an automated and rapid fashion."

Growing Investment, Lack of Confidence

IT professionals recognize the threat IoT presents to their business. Based on the survey results, the top emerging IoT threats for IT professionals include data breaches (69%), ransomware attacks (60%), supply chain attacks (45%), and Denial of Service (DDoS) attacks (42%).

IT leaders plan to increase spending on security stacks in the following year, but lack the knowledge and confidence to make informed decisions on filling security blind spots:

  • 87% of companies spent more on IoT security in 2023 compared to 2022.
  • 89% of companies plan to spend more on IoT security in 2024 compared to 2023.
  • Only 63% of Boards feel they have enough information on IoT security to make informed decisions.

The numbers presented here spotlight how the IoT applications and device systems that organizations rely on are vulnerable, are being attacked, and lack the focus on cybersecurity that traditional IT systems have. While there is board-level visibility into IoT security and internal discussions between the managers of IoT systems, most organizations lack the proper technology solutions, reporting, and governance to ensure that IoT systems are always visible, operational, and secure.

Download the full report here.

Featured

  • Evolving Cybersecurity Strategies: Uniting Human Risk Management and Security Awareness Training

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

  • Report: 1 in 3 Easily Exploitable Vulnerabilities Found on Cloud Assets

    CyCognito recently released new research highlighting critical security vulnerabilities across cloud-hosted assets, revealing that one in three easily exploitable vulnerabilities or misconfigurations are found on cloud assets. As organizations increasingly shift to multi-cloud strategies, the findings underscore significant security gaps that could provide attackers with potential footholds into networks. Read Now

  • Built for Today, Ready for Tomorrow

    Selecting the right VMS is critical for any organization that depends on video surveillance to ensure safety, security and operational efficiency. While many organizations focus on immediate needs such as budget and deployment size, let us review some of the long-term considerations that can significantly impact a VMS's utility and flexibility. Read Now

  • Paving the Way to Smart Buildings

    In today's rapidly evolving security landscape, the convergence of on-prem, edge and cloud technologies are critical. The physical security landscape is undergoing a profound transformation, driven by the rapid digitalization of buildings and the evolving needs of modern organizations. As the buildings sector pivots towards smart, AI and data-driven operations, the integration of both edge and cloud technology has become crucial. Read Now

  • The Cybersecurity Time Bomb

    If you work in physical security, you have probably seen it: a camera, access control system, or intrusion detection device installed years ago, humming along without a single update. It is a common scenario that security professionals have come to accept as "normal." But here is the reality: this mindset is actively putting organizations at risk. Read Now

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.