IoT security is also making strides.

Please provide the information below to view the online Mobile Security Index Report.

Thank you.

You will soon receive an email with a link to confirm your access, or follow the link below.

Download this document

Thank you.

You may now close this message and continue to your article.

More good news: Greater awareness is driving more investment in IoT security. And the expanding use of IoT security best practices, such as deploying organization-wide standards, centralizing coordination of IoT projects and devices, and applying more oversight for IoT projects, are also impacting IoT security spending.

Keeping a close eye on “things”

Among survey respondents who have deployed IoT devices, nearly all have applied at least some IoT security practices, and most are monitoring the effectiveness of encryption measures applied within IoT frameworks. Nearly four in five (79%) use automated tools for this purpose, while just under one-half (46%) are still relying on manual audits or third-party assessments.

93%

of IoT users have applied at least some IoT security best practices.

96%

use automated solutions to monitor the effectiveness of the encryption measures used to protect IoT device data.

70%

of IoT users have applied role-based access control to provision access to their devices.

The majority of respondents (69%) and automatically apply security patches to all of the IoT devices in their organizations. We can take this as a positive, in that modern IoT security practices are happening fairly widely. But it’s also a negative result given how cyberattacks work. Cyberattacks are like water; threat actors find “leaks,” or gaps in coverage, and exploit them to launch an attack. The 31% of respondents citing no systems in place to automatically track and patch all IoT devices are shouldering substantial risk.

Let’s
connect

Call Sales
877-297-7816

Chat with us
Start live chat

 

Have us contact you
Request a call