* . *
  • About
  • Advertise
  • Privacy & Policy
  • Contact
Friday, February 27, 2026
Earth-News
  • Home
  • Business
  • Entertainment

    What the Future Holds for UK Entertainment in 2025

    Discover the All-New ‘ABC Entertainment Update’ Podcast – Your Ultimate Source for the Latest in TV!

    Discover Thrilling Adventures Awaiting Every Movie Lover at the Film Festival

    Dorset Players offer themes of community in popular stage event – Bennington Banner

    GrayCo Grows Its Portfolio with Exciting New Multifamily Property in Charlotte’s Thriving Arts and Entertainment District

    Cuatro Talents Ready to Deliver a Flawless ’10’ Performance!

  • General
  • Health
  • News

    Cracking the Code: Why China’s Economic Challenges Aren’t Shaking Markets, Unlike America’s” – Bloomberg

    Trump’s Narrow Window to Spread the Truth About Harris

    Trump’s Narrow Window to Spread the Truth About Harris

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Trending Tags

    • Trump Inauguration
    • United Stated
    • White House
    • Market Stories
    • Election Results
  • Science
  • Sports
  • Technology

    Trump Media & Technology Group Under Fire for Algorithmic Misconduct: Impact on Its Valuation Explained

    Flexport Launches Groundbreaking Technology to Automate Tariff Refunds

    EU and Nigeria Kick Off Exciting New Partnership in Groundbreaking Science & Technology

    Hormel Creates, Fills New Chief Technology Officer Position – Meatingplace

    How Colt Technology is Driving the Future of AI Innovation

    VENU Partners with AmpThink to Revolutionize Operational Efficiency with Cutting-Edge Technology

    Trending Tags

    • Nintendo Switch
    • CES 2017
    • Playstation 4 Pro
    • Mark Zuckerberg
No Result
View All Result
  • Home
  • Business
  • Entertainment

    What the Future Holds for UK Entertainment in 2025

    Discover the All-New ‘ABC Entertainment Update’ Podcast – Your Ultimate Source for the Latest in TV!

    Discover Thrilling Adventures Awaiting Every Movie Lover at the Film Festival

    Dorset Players offer themes of community in popular stage event – Bennington Banner

    GrayCo Grows Its Portfolio with Exciting New Multifamily Property in Charlotte’s Thriving Arts and Entertainment District

    Cuatro Talents Ready to Deliver a Flawless ’10’ Performance!

  • General
  • Health
  • News

    Cracking the Code: Why China’s Economic Challenges Aren’t Shaking Markets, Unlike America’s” – Bloomberg

    Trump’s Narrow Window to Spread the Truth About Harris

    Trump’s Narrow Window to Spread the Truth About Harris

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Trending Tags

    • Trump Inauguration
    • United Stated
    • White House
    • Market Stories
    • Election Results
  • Science
  • Sports
  • Technology

    Trump Media & Technology Group Under Fire for Algorithmic Misconduct: Impact on Its Valuation Explained

    Flexport Launches Groundbreaking Technology to Automate Tariff Refunds

    EU and Nigeria Kick Off Exciting New Partnership in Groundbreaking Science & Technology

    Hormel Creates, Fills New Chief Technology Officer Position – Meatingplace

    How Colt Technology is Driving the Future of AI Innovation

    VENU Partners with AmpThink to Revolutionize Operational Efficiency with Cutting-Edge Technology

    Trending Tags

    • Nintendo Switch
    • CES 2017
    • Playstation 4 Pro
    • Mark Zuckerberg
No Result
View All Result
Earth-News
No Result
View All Result
Home Business

More connected, less secure: Addressing IoT and OT threats to the enterprise

November 15, 2023
in Business
More connected, less secure: Addressing IoT and OT threats to the enterprise
Share on FacebookShare on Twitter

A forward-thinking zero trust strategy is necessary to securely manage IoT and OT devices at scale. Effectively protecting networks begins with an honest look at connectivity.

The Internet of Things (IoT) is a permanent fixture for consumers and enterprises as the world becomes more and more interconnected. By 2027, the global number of connected IoT devices is projected to exceed 29 billion, a significant increase from the 16.7 billion devices reported in 2023.

While the connected device landscape continues to expand and evolve, so do the opportunities for cybercriminals to exploit IoT vulnerabilities. IoT gives businesses many advantages: enhanced efficiency, data-driven insights, reduced costs, and faster innovation. It also introduces new security challenges that demand our attention, especially as IoT is integrated into operational technology (OT) environments.

In this article, we’ll explore the risks associated with IoT and OT connectivity and the measures that organizations need to take to safeguard enterprise networks.

6 IoT vulnerabilities to watch out for

Security risks are a significant concern for businesses using LoT and OT technology. Let’s delve into some key loT vulnerabilities that must be addressed:

Limited built-in security features: While many loT devices have some security features, they typically are not sufficient to protect against sophisticated attacks. Their vulnerabilities can serve as gateways into the enterprise network for malicious actors.

2. Weak authentication and authorization: One of the foremost vulnerabilities in IoT deployments stems from inadequate authentication and authorization practices. Weak or default passwords, a lack of multi-factor authentication (MFA), and insufficient access controls can pave the way for malicious actors to infiltrate networks and devices. These issues are akin to leaving the front door to your digital infrastructure unlocked.

3. Lack of visibility into devices and connections: In a world where countless devices connect to the corporate network, blind spots and gaps in visibility are a major security weakness. Without comprehensive visibility into your network, you might not even know which devices are connected, let alone what they are doing. Your network becomes a breeding ground for threats to go undetected.

4. Excessive implicit trust: Too much trust in IoT devices is yet another vulnerability, particularly concerning shadow IoT devices. Unsanctioned devices often lack essential security controls and don’t adhere to corporate security policies. By allowing these devices to access the network freely, organizations open additional entry points for potential threats, putting critical systems and data at risk.

5. Not keeping up with patching: The failure to regularly update and patch IoT devices is another Achilles’ heel. Unpatched devices are inherently more susceptible to attacks, as cybercriminals commonly exploit known vulnerabilities.

6. Ignoring encrypted traffic: Encryption is a common security measure, but it can also provide cover for cybercriminals to hide threats and evade detection. Failing to inspect encrypted traffic means missing the chance to detect and prevent attacks. Attackers commonly exploit encrypted channels to compromise systems, rendering your IoT network less secure than it might seem.

While the risks coming from these vulnerabilities are abundantly clear, it’s important for organizations to understand the IoT/OT threat landscape in order to effectively protect their networks.

Malware is the top threat to IoT/OT

With so many vulnerabilities plaguing IoT devices, these devices are attractive and relatively easy entry points into corporate networks for attackers. From there, they can move laterally and gain access to other connected devices, servers, and sensitive data.

IoT devices are often co-opted into IoT botnets, which are networks of compromised devices controlled remotely by threat actors. These botnets are then leveraged to carry out more extensive and impactful cyberattacks, such as distributed denial-of-service (DDoS) attacks, where a multitude of compromised devices simultaneously flood a target with traffic, overwhelm and exhaust its resources, and potentially cause significant disruption and financial losses.

In fact, two notorious botnets, Mirai and Gafgyt, are major contributors to a recent surge in IoT malware attacks. In the first half of 2023, the Zscaler ThreatLabz research team observed approximately 300,000 attempted malware attacks by known IoT threat actors based on data from the world’s largest inline security cloud. This represents a staggering 400% increase in IoT malware attacks compared to the previous year (January to June 2022), and the Mirai and Gafgyt botnets accounted for 66% of all blocked payloads.

Threats like IoT malware can have serious implications for critical infrastructure industries like manufacturing. Manufacturers are increasingly adopting smart technology and converging IoT devices into existing OT systems in order to meet modern demands for faster supply chain fulfillment and innovation. But manufacturing faces more than triple the number of IoT malware attacks compared to other sectors. Our research showed that manufacturing experienced 54.5% of the total number of attempted IoT malware attacks.

This surge in IoT malware attacks against manufacturing is not an isolated incident. It is an alarmingly real trend in the IoT/OT threat landscape, as attackers strategically capitalize on increased IoT adoption and convergence with OT environments.

Zero trust is an IoT/OT necessity

It is imperative that all organizations and all industries evolve their cybersecurity measures and take proactive steps to tackle this increasingly complex IoT/OT threat landscape.

Best practices like multi-factor authentication, IoT security frameworks, and employee training are important steps. But it is most critical to modernize your security strategy. Traditional approaches and tools are inadequate in meeting the demands of protecting IoT and OT devices.

The following measures are vital to establishing an effective security strategy and reducing the risks associated with IoT/OT threats.

Implement a zero trust architecture: Operating with a “trust no one and no device, inspect and verify every connection” mindset is fundamental to ensuring the security of IoT/OT devices. Organizations must eliminate implicit trust for IoT and OT and enforce segmentation with least-privileged access to ensure users and devices can access only what they need, limiting lateral movement opportunities for potential attackers

Maintain visibility into all devices: Visibility is a fundamental element in a zero trust security architecture. Securing IoT/OT devices begins with knowing what devices are connected to your network and what those devices are doing. Gain visibility into all devices, including unmanaged devices, and leverage AI/ML capabilities to automatically classify and identify device types based on activity and behavior.

Proactively identify vulnerabilities: To stay ahead of potential threats, organizations should aim to identify vulnerabilities before they turn into problems. Conducting regular security assessments, patching, and continuous monitoring is key to achieving this goal.

Inspect all traffic: Ensure that all traffic, both encrypted and unencrypted, goes through inspection. Any unsanctioned shadow IoT devices that require internet access should go through traffic inspection and ideally be blocked from corporate data via a proxy.

Be ready to disrupt attacks at any stage: The organization should embrace a multi-layered security strategy, with multiple lines of defense to disrupt IoT/OT attacks at any stage, from reducing your attack surface to preventing initial compromise, stopping lateral threat movement, and preventing exfiltration of data

IoT and OT adoption offers significant advantages for businesses today, but it comes hand-in-hand with substantial risks. A modern zero trust approach is necessary to effectively and securely manage IoT and OT devices at scale and the right solution can ensure success. 

The Zscaler Zero Trust Exchange platform provides a holistic zero trust approach to securing IoT/OT. It verifies identity and context, applies access controls, and enforces policies before establishing a secure connection between a device and an application, regardless of location or network.

To learn more about how organizations gain a powerful defense against IoT and OT attacks with Zscaler, download the Zscaler ThreatLabz 2023 Enterprise IoT and OT Threat Report.

>>> Read full article>>>
Copyright for syndicated content belongs to the linked Source : CIO – https://www.cio.com/article/1247152/more-connected-less-secure-addressing-iot-and-ot-threats-to-the-enterprise.html

Tags: businessConnectedsecure
Previous Post

How leadership can empower developers in the AI era

Next Post

“The Fall Guy” Delayed Two Months

Long-term warming reduces fish biomass, but heatwaves shift it – Nature

February 27, 2026

Scientists Unlock the Secret to Solving Puzzles in Your Dreams

February 27, 2026

How Roof Renovations at the Food Science and Technology Building Will Affect Transportation at Virginia Tech

February 27, 2026

Lifestyles Inc. Ignites Empowerment and Unlocks Exciting New Opportunities

February 27, 2026

KCI, Northland organizations implementing multilingual signage and services for FIFA World Cup – KSHB 41 Kansas City

February 27, 2026

3 Major Challenges and Exciting Opportunities Shaping the Future of the US Economy

February 27, 2026

What the Future Holds for UK Entertainment in 2025

February 27, 2026

Chris Bosh Opens Up: ‘I’m Lucky to Be Alive’ After Health Scare

February 27, 2026

Chernobyl at 40: Unraveling the Physics, Politics, and Ongoing Nuclear Debate

February 27, 2026

Trump Media & Technology Group Under Fire for Algorithmic Misconduct: Impact on Its Valuation Explained

February 27, 2026

Categories

Archives

February 2026
M T W T F S S
 1
2345678
9101112131415
16171819202122
232425262728  
« Jan    
Earth-News.info

The Earth News is an independent English-language daily published Website from all around the World News

Browse by Category

  • Business (20,132)
  • Ecology (1,094)
  • Economy (1,111)
  • Entertainment (21,988)
  • General (20,129)
  • Health (10,151)
  • Lifestyle (1,126)
  • News (22,149)
  • People (1,116)
  • Politics (1,128)
  • Science (16,326)
  • Sports (21,613)
  • Technology (16,093)
  • World (1,103)

Recent News

Long-term warming reduces fish biomass, but heatwaves shift it – Nature

February 27, 2026

Scientists Unlock the Secret to Solving Puzzles in Your Dreams

February 27, 2026
  • About
  • Advertise
  • Privacy & Policy
  • Contact

© 2023 earth-news.info

No Result
View All Result

© 2023 earth-news.info

No Result
View All Result

© 2023 earth-news.info

Go to mobile version