Menu

M2M FEATURE NEWS

Security Leaders Say Beware the Internet of Evil Things

By Ken Briodagh April 17, 2015

A new report released on April 15 by Pwnie Express, a remote security monitoring vendor, warns about the risks inherent in the so-called “Internet of Evil Things” (IoET) and defines the key factors and threats facing businesses today. It also offers a framework for a comprehensive defense against the IoET.

“This report underscores the need for increased visibility and actionable intelligence on all devices across the enterprise to enhance an organization’s ability to quickly identify and thwart an attack,” said Paul Paget, CEO, Pwnie Express. “It’s our hope that by offering a classification structure for high-risk devices, infosec professionals are empowered to mobilize and begin assessing their security systems’ readiness to defend business-critical infrastructure against the IoET threat.”

 Pwnie surveyed more than 600 security professionals for the report and some of the top findings were pretty interesting. More than 80 percent of the respondents said they were concerned that already have rogue or unauthorized devices operating undetected in their networks. They are perhaps concerned because almost 70 percent of them said they don’t have full visibility of all the wireless devices inside their networks. Scary. The last important thing is that the security folks said the most dangerous devices running today are rogue access points, MiFi and mobile hotspots.

“Cyber attackers seek the path of least resistance, often targeting devices and systems of branch locations, which are perceived to be less secure,” said Mark Arnold, Director Information Security, PTC. “It’s critical that enterprises implement innovative tools and policies across the entire organization to automatically detect the presence of unauthorized or mismanaged devices in real time, empowering security teams to respond quickly and effectively.”

Although it’s fun to refer to the IoT’s Evil Twin, the IoET isn’t a real thing yet. There have as of yet been no major breaches, remember. We’re at the beginning of an IoT-enabled world where these threats will become more likely, however. There is an emerging threat vector that will only grow as adoption of connected devices continues to expand.

The answer is simple: don’t freak out, and don’t be unprepared. 




Edited by Maurice Nagle
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

Editorial Director

SHARE THIS ARTICLE
Related Articles

Beyond the Closet, Connecting to IoT

By: Gary Audin    11/11/2020

Two challenges arise when considering cable based IoT.

Read More

Banyan Security Enhances Secure Remote Access for Engineering Resources

By: Ken Briodagh    10/27/2020

Banyan's Continuous Authorization Can Grant or Revoke Access to Sensitive Engineering Environments and Applications in Real-time Based on TrustScore

Read More

Senet Eyes RAN Partnerships as Key to Delivering Network Services for Massive IoT

By: Arti Loftus    10/21/2020

To meet the challenges that come with providing network connectivity for IoT solutions, Senet is executing a strategy for massive IoT that will be bui…

Read More

mimik Selected by 5G Open Innovation Lab to Drive Early Adoption of 5G

By: Ken Briodagh    10/15/2020

mimik's patented Hybrid Edge Cloud platform will boost the performance and reduce the cost of 5G Networks

Read More

5G Sets New Standards for Vertical Industries' IoT Connectivity

By: Special Guest    10/13/2020

As 5G rolls out across the world, vertical industries across IoT are working on additional standards to make the technology suitable for their industr…

Read More