makers need to make is how IoT devices are integrated . In an effort to draw on useful , existing data and optimise operations , devices can be “ plumbed ” into corporate and production networks . However , this may also serve as a route for threat actors to gain access .
“ The responsibility for how these devices are deployed remains a challenge for the organisation to manage risk .”
Some of the security threats that IoT devices face range from weak credentials that are prone to hacks , unencrypted communication , or a lack of tight security measures . Also , as Lewis Duke , SecOps and Threat Intelligence Lead at Trend
Micro states : “ Infrequent software updates leave them vulnerable to known exploits , making them prime targets or attackers .”
One of the problems is also the sheer volume of IoT devices , given such high customer demands . As a result , their security measures can be lacking , making them more vulnerable to attack .
On this , David Emm , Principal Security Researcher , Global Research and Analysis Team at Kaspersky , says : “ The most common attack vectors include device hijacking , where attackers take control of IoT devices to conduct malicious activities ; and data breaches , which involve the unauthorised access and theft of personal or corporate data .”
102 July 2024