Source |
CSO |
Identifiant |
747613 |
Date de publication |
2018-07-17 08:33:00 (vue: 2018-07-22 02:01:50) |
Titre |
IDG Contributor Network: 8 steps to secure unmanaged devices in the enterprise |
Texte |
For many years now, enterprise networks have seen a steady stream of new devices that are outside of IT department control. The mobility trend has given way to the rise of the IoT and the result is a lot of unmanageable endpoints that represent a clear security risk. Smart lighting, printers, Bluetooth keyboards, smart TVs, video cameras, switches and routers are all connected devices that often lack any built-in security.This security blind spot is ripe for exploitation by cybercriminals probing your network for weaknesses. Despite 97 percent of risk professionals admitting that a data breach or cyber-attack caused by unsecure IoT devices could be catastrophic for their organization, according to a survey by the Ponemon Institute and Shared Assessments, just 15 percent have an inventory of most of their IoT and only 46 percent have a policy in place to disable devices that pose a risk. |
Notes |
|
Envoyé |
Oui |
Condensat |
according admitting all any are article assessments attack blind bluetooth breach built cameras catastrophic caused clear click connected contributor control could cyber cybercriminals data department despite devices disable endpoints enterprise exploitation full given has have here idg institute inventory iot just keyboards lack lighting lot many mobility most network network: networks new now often only organization outside percent place please policy ponemon pose printers probing professionals read represent result ripe rise risk routers secure security seen shared smart spot steady steps stream survey switches trend tvs unmanageable unmanaged unsecure video way weaknesses years your |
Tags |
Data Breach
|
Stories |
|
Move |
|