* . *
  • About
  • Advertise
  • Privacy & Policy
  • Contact
Saturday, December 13, 2025
Earth-News
  • Home
  • Business
  • Entertainment
    Mid-Michigan entertainment for the weekend of Dec. 12-14 and beyond – The Morning Sun

    Unmissable Mid-Michigan Entertainment Events Happening December 12-14 and Beyond

    Wisconsin State Patrol drops reminder: Your favorite in-car entertainment might be breaking the law – WFRV Local 5

    Warning from Wisconsin State Patrol: Your Favorite In-Car Entertainment Might Be Breaking the Law!

    Universal Orlando’s New Year’s Eve celebrations feature live entertainment, characters, countdowns – WKMG

    Ring in the New Year at Universal Orlando with Live Entertainment, Beloved Characters, and Thrilling Countdowns!

    Ashuelot Concerts presents ‘Tolstoy Inspired…’ winter chamber music concerts – Brattleboro Reformer

    Discover the Enchantment of ‘Tolstoy Inspired…’ Winter Chamber Music Concerts

    How the Chiefs stole Christmas—CMO Lara Krug on holiday marketing and new entertainment plans – Ad Age

    How the Chiefs Stole Christmas: CMO Lara Krug Reveals Holiday Marketing Magic and Exciting New Entertainment Plans

    What Netflix’s Acquisition of Warner Bros. Means for the Movies – WKTV

    How Netflix’s Acquisition of Warner Bros. Is Set to Revolutionize the Future of Movies

  • General
  • Health
  • News

    Cracking the Code: Why China’s Economic Challenges Aren’t Shaking Markets, Unlike America’s” – Bloomberg

    Trump’s Narrow Window to Spread the Truth About Harris

    Trump’s Narrow Window to Spread the Truth About Harris

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Trending Tags

    • Trump Inauguration
    • United Stated
    • White House
    • Market Stories
    • Election Results
  • Science
  • Sports
  • Technology
    If you’re fed up with data breaches, this new technology could finally help – Fast Company

    Fed Up with Data Breaches? Discover the Breakthrough Technology That Could Finally Protect You

    IDNR reminds hunters to be mindful of technology use in the field – The Labor Tribune

    Hunters Urged to Use Technology Responsibly in the Field

    Korea Innovation Foundation selects 3 Innovative energy companies, TurbineCrew, TMEVNET, and Mona for Global Technology Commercialization Support Program (North America) – The Korea Herald

    Korea Innovation Foundation Selects TurbineCrew, TMEVNET, and Mona to Drive Global Energy Tech Expansion in North America

    Opinion: Competition for technology services will help transform public media – current.org

    Opinion: Competition for technology services will help transform public media – current.org

    Geothermal Heat Exchange Technology Evaluated as a Potential Solution for Grid Support and Sustainable Cooling in Hawaii – SolarQuarter

    Exploring Geothermal Heat Exchange Technology as a Game-Changer for Grid Support and Sustainable Cooling in Hawaii

    Pompeii offers insights into ancient Roman building technology – MIT News

    Uncover the Hidden Secrets of Ancient Roman Building Technology Through Pompeii

    Trending Tags

    • Nintendo Switch
    • CES 2017
    • Playstation 4 Pro
    • Mark Zuckerberg
No Result
View All Result
  • Home
  • Business
  • Entertainment
    Mid-Michigan entertainment for the weekend of Dec. 12-14 and beyond – The Morning Sun

    Unmissable Mid-Michigan Entertainment Events Happening December 12-14 and Beyond

    Wisconsin State Patrol drops reminder: Your favorite in-car entertainment might be breaking the law – WFRV Local 5

    Warning from Wisconsin State Patrol: Your Favorite In-Car Entertainment Might Be Breaking the Law!

    Universal Orlando’s New Year’s Eve celebrations feature live entertainment, characters, countdowns – WKMG

    Ring in the New Year at Universal Orlando with Live Entertainment, Beloved Characters, and Thrilling Countdowns!

    Ashuelot Concerts presents ‘Tolstoy Inspired…’ winter chamber music concerts – Brattleboro Reformer

    Discover the Enchantment of ‘Tolstoy Inspired…’ Winter Chamber Music Concerts

    How the Chiefs stole Christmas—CMO Lara Krug on holiday marketing and new entertainment plans – Ad Age

    How the Chiefs Stole Christmas: CMO Lara Krug Reveals Holiday Marketing Magic and Exciting New Entertainment Plans

    What Netflix’s Acquisition of Warner Bros. Means for the Movies – WKTV

    How Netflix’s Acquisition of Warner Bros. Is Set to Revolutionize the Future of Movies

  • General
  • Health
  • News

    Cracking the Code: Why China’s Economic Challenges Aren’t Shaking Markets, Unlike America’s” – Bloomberg

    Trump’s Narrow Window to Spread the Truth About Harris

    Trump’s Narrow Window to Spread the Truth About Harris

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Trending Tags

    • Trump Inauguration
    • United Stated
    • White House
    • Market Stories
    • Election Results
  • Science
  • Sports
  • Technology
    If you’re fed up with data breaches, this new technology could finally help – Fast Company

    Fed Up with Data Breaches? Discover the Breakthrough Technology That Could Finally Protect You

    IDNR reminds hunters to be mindful of technology use in the field – The Labor Tribune

    Hunters Urged to Use Technology Responsibly in the Field

    Korea Innovation Foundation selects 3 Innovative energy companies, TurbineCrew, TMEVNET, and Mona for Global Technology Commercialization Support Program (North America) – The Korea Herald

    Korea Innovation Foundation Selects TurbineCrew, TMEVNET, and Mona to Drive Global Energy Tech Expansion in North America

    Opinion: Competition for technology services will help transform public media – current.org

    Opinion: Competition for technology services will help transform public media – current.org

    Geothermal Heat Exchange Technology Evaluated as a Potential Solution for Grid Support and Sustainable Cooling in Hawaii – SolarQuarter

    Exploring Geothermal Heat Exchange Technology as a Game-Changer for Grid Support and Sustainable Cooling in Hawaii

    Pompeii offers insights into ancient Roman building technology – MIT News

    Uncover the Hidden Secrets of Ancient Roman Building Technology Through Pompeii

    Trending Tags

    • Nintendo Switch
    • CES 2017
    • Playstation 4 Pro
    • Mark Zuckerberg
No Result
View All Result
Earth-News
No Result
View All Result
Home Business

More connected, less secure: Addressing IoT and OT threats to the enterprise

November 15, 2023
in Business
More connected, less secure: Addressing IoT and OT threats to the enterprise
Share on FacebookShare on Twitter

A forward-thinking zero trust strategy is necessary to securely manage IoT and OT devices at scale. Effectively protecting networks begins with an honest look at connectivity.

The Internet of Things (IoT) is a permanent fixture for consumers and enterprises as the world becomes more and more interconnected. By 2027, the global number of connected IoT devices is projected to exceed 29 billion, a significant increase from the 16.7 billion devices reported in 2023.

While the connected device landscape continues to expand and evolve, so do the opportunities for cybercriminals to exploit IoT vulnerabilities. IoT gives businesses many advantages: enhanced efficiency, data-driven insights, reduced costs, and faster innovation. It also introduces new security challenges that demand our attention, especially as IoT is integrated into operational technology (OT) environments.

In this article, we’ll explore the risks associated with IoT and OT connectivity and the measures that organizations need to take to safeguard enterprise networks.

6 IoT vulnerabilities to watch out for

Security risks are a significant concern for businesses using LoT and OT technology. Let’s delve into some key loT vulnerabilities that must be addressed:

Limited built-in security features: While many loT devices have some security features, they typically are not sufficient to protect against sophisticated attacks. Their vulnerabilities can serve as gateways into the enterprise network for malicious actors.

2. Weak authentication and authorization: One of the foremost vulnerabilities in IoT deployments stems from inadequate authentication and authorization practices. Weak or default passwords, a lack of multi-factor authentication (MFA), and insufficient access controls can pave the way for malicious actors to infiltrate networks and devices. These issues are akin to leaving the front door to your digital infrastructure unlocked.

3. Lack of visibility into devices and connections: In a world where countless devices connect to the corporate network, blind spots and gaps in visibility are a major security weakness. Without comprehensive visibility into your network, you might not even know which devices are connected, let alone what they are doing. Your network becomes a breeding ground for threats to go undetected.

4. Excessive implicit trust: Too much trust in IoT devices is yet another vulnerability, particularly concerning shadow IoT devices. Unsanctioned devices often lack essential security controls and don’t adhere to corporate security policies. By allowing these devices to access the network freely, organizations open additional entry points for potential threats, putting critical systems and data at risk.

5. Not keeping up with patching: The failure to regularly update and patch IoT devices is another Achilles’ heel. Unpatched devices are inherently more susceptible to attacks, as cybercriminals commonly exploit known vulnerabilities.

6. Ignoring encrypted traffic: Encryption is a common security measure, but it can also provide cover for cybercriminals to hide threats and evade detection. Failing to inspect encrypted traffic means missing the chance to detect and prevent attacks. Attackers commonly exploit encrypted channels to compromise systems, rendering your IoT network less secure than it might seem.

While the risks coming from these vulnerabilities are abundantly clear, it’s important for organizations to understand the IoT/OT threat landscape in order to effectively protect their networks.

Malware is the top threat to IoT/OT

With so many vulnerabilities plaguing IoT devices, these devices are attractive and relatively easy entry points into corporate networks for attackers. From there, they can move laterally and gain access to other connected devices, servers, and sensitive data.

IoT devices are often co-opted into IoT botnets, which are networks of compromised devices controlled remotely by threat actors. These botnets are then leveraged to carry out more extensive and impactful cyberattacks, such as distributed denial-of-service (DDoS) attacks, where a multitude of compromised devices simultaneously flood a target with traffic, overwhelm and exhaust its resources, and potentially cause significant disruption and financial losses.

In fact, two notorious botnets, Mirai and Gafgyt, are major contributors to a recent surge in IoT malware attacks. In the first half of 2023, the Zscaler ThreatLabz research team observed approximately 300,000 attempted malware attacks by known IoT threat actors based on data from the world’s largest inline security cloud. This represents a staggering 400% increase in IoT malware attacks compared to the previous year (January to June 2022), and the Mirai and Gafgyt botnets accounted for 66% of all blocked payloads.

Threats like IoT malware can have serious implications for critical infrastructure industries like manufacturing. Manufacturers are increasingly adopting smart technology and converging IoT devices into existing OT systems in order to meet modern demands for faster supply chain fulfillment and innovation. But manufacturing faces more than triple the number of IoT malware attacks compared to other sectors. Our research showed that manufacturing experienced 54.5% of the total number of attempted IoT malware attacks.

This surge in IoT malware attacks against manufacturing is not an isolated incident. It is an alarmingly real trend in the IoT/OT threat landscape, as attackers strategically capitalize on increased IoT adoption and convergence with OT environments.

Zero trust is an IoT/OT necessity

It is imperative that all organizations and all industries evolve their cybersecurity measures and take proactive steps to tackle this increasingly complex IoT/OT threat landscape.

Best practices like multi-factor authentication, IoT security frameworks, and employee training are important steps. But it is most critical to modernize your security strategy. Traditional approaches and tools are inadequate in meeting the demands of protecting IoT and OT devices.

The following measures are vital to establishing an effective security strategy and reducing the risks associated with IoT/OT threats.

Implement a zero trust architecture: Operating with a “trust no one and no device, inspect and verify every connection” mindset is fundamental to ensuring the security of IoT/OT devices. Organizations must eliminate implicit trust for IoT and OT and enforce segmentation with least-privileged access to ensure users and devices can access only what they need, limiting lateral movement opportunities for potential attackers

Maintain visibility into all devices: Visibility is a fundamental element in a zero trust security architecture. Securing IoT/OT devices begins with knowing what devices are connected to your network and what those devices are doing. Gain visibility into all devices, including unmanaged devices, and leverage AI/ML capabilities to automatically classify and identify device types based on activity and behavior.

Proactively identify vulnerabilities: To stay ahead of potential threats, organizations should aim to identify vulnerabilities before they turn into problems. Conducting regular security assessments, patching, and continuous monitoring is key to achieving this goal.

Inspect all traffic: Ensure that all traffic, both encrypted and unencrypted, goes through inspection. Any unsanctioned shadow IoT devices that require internet access should go through traffic inspection and ideally be blocked from corporate data via a proxy.

Be ready to disrupt attacks at any stage: The organization should embrace a multi-layered security strategy, with multiple lines of defense to disrupt IoT/OT attacks at any stage, from reducing your attack surface to preventing initial compromise, stopping lateral threat movement, and preventing exfiltration of data

IoT and OT adoption offers significant advantages for businesses today, but it comes hand-in-hand with substantial risks. A modern zero trust approach is necessary to effectively and securely manage IoT and OT devices at scale and the right solution can ensure success. 

The Zscaler Zero Trust Exchange platform provides a holistic zero trust approach to securing IoT/OT. It verifies identity and context, applies access controls, and enforces policies before establishing a secure connection between a device and an application, regardless of location or network.

To learn more about how organizations gain a powerful defense against IoT and OT attacks with Zscaler, download the Zscaler ThreatLabz 2023 Enterprise IoT and OT Threat Report.

>>> Read full article>>>
Copyright for syndicated content belongs to the linked Source : CIO – https://www.cio.com/article/1247152/more-connected-less-secure-addressing-iot-and-ot-threats-to-the-enterprise.html

Tags: businessConnectedsecure
Previous Post

How leadership can empower developers in the AI era

Next Post

“The Fall Guy” Delayed Two Months

37 photos of the most unusual McDonald’s restaurants in the world – Business Insider

37 Breathtaking Photos of the World’s Most Unusual McDonald’s Restaurants

December 12, 2025
Trump says he’s making America’s economy great again. He’s addressing the wrong problem – CNN

Trump Boasts About Reviving America’s Economy – But Overlooks the True Challenge

December 12, 2025
Mid-Michigan entertainment for the weekend of Dec. 12-14 and beyond – The Morning Sun

Unmissable Mid-Michigan Entertainment Events Happening December 12-14 and Beyond

December 12, 2025
Health Experts Slam Possible FDA ‘Black Box’ Warning for COVID Vaccines – Scientific American

Health Experts Sound the Alarm on Possible FDA ‘Black Box’ Warning for COVID Vaccines

December 12, 2025
Sources: Trump told Blakeman victory unlikely in race against Stefanik – Spectrum News NY1

Trump Warned Blakeman That Beating Stefanik Would Be a Tough Battle

December 12, 2025
Azerbaijan Presents National Statement at UN Environment Assembly – Caspian Post

Azerbaijan Makes a Bold Impact at the UN Environment Assembly

December 12, 2025
SHU Discovery Science Center and Planetarium – WSHU

Explore the Wonders of Science and Space at SHU Discovery Science Center and Planetarium

December 12, 2025
Dessalines STEAM Academy offers Brockton families a new school option – Enterprise News

Dessalines STEAM Academy Opens, Offering Brockton Families an Exciting New School Choice

December 12, 2025
Lifestyle Lookout: Jingle Bell Run, Lighted Bike Parade and live music – My Bellingham Now

Get Ready for the Jingle Bell Run, Lighted Bike Parade, and Live Music Extravaganza!

December 12, 2025
If you’re fed up with data breaches, this new technology could finally help – Fast Company

Fed Up with Data Breaches? Discover the Breakthrough Technology That Could Finally Protect You

December 12, 2025

Categories

Archives

December 2025
M T W T F S S
1234567
891011121314
15161718192021
22232425262728
293031  
« Nov    
Earth-News.info

The Earth News is an independent English-language daily published Website from all around the World News

Browse by Category

  • Business (20,132)
  • Ecology (966)
  • Economy (985)
  • Entertainment (21,861)
  • General (18,706)
  • Health (10,025)
  • Lifestyle (996)
  • News (22,149)
  • People (990)
  • Politics (998)
  • Science (16,199)
  • Sports (21,485)
  • Technology (15,966)
  • World (973)

Recent News

37 photos of the most unusual McDonald’s restaurants in the world – Business Insider

37 Breathtaking Photos of the World’s Most Unusual McDonald’s Restaurants

December 12, 2025
Trump says he’s making America’s economy great again. He’s addressing the wrong problem – CNN

Trump Boasts About Reviving America’s Economy – But Overlooks the True Challenge

December 12, 2025
  • About
  • Advertise
  • Privacy & Policy
  • Contact

© 2023 earth-news.info

No Result
View All Result

© 2023 earth-news.info

No Result
View All Result

© 2023 earth-news.info

Go to mobile version