IT study reveals glaring vulnerabilities: Industry must protect IoT controls
Manufacturers neglect security
As a result, there is not much confidence in the manufacturer-side security of IoT devices: 24 percent of the 318 respondents consider this to be "not sufficient", with a further 54 percent considering it to be "partially sufficient" at most. Hackers keep an eye on vulnerable devices for some time now - and the trend is rising. 63 percent of IT experts confirm that hackers are already misusing IoT devices as a gateway into networks. In companies in particular, confidence in the security measures around IoT is low: only a quarter of the 318 respondents see complete security guaranteed by their own IT department, while 49 percent see it as only "partially sufficient". And 37 percent of IT professionals surveyed for the IoT Security Report 2022 have already experienced security-related incidents with endpoints that are no normal PC clients. "The risk is constantly increasing as connected manufacturing continues to expand. In general, the number of networked devices is expected to double in a few years," says Jan Wendenburg of ONEKEY. In addition to the automatic analysis platform for checking device firmware, the company also operates its own test lab, where the hardware of major manufacturers is tested and vulnerability reports, so-called advisories, are published on a regular basis.Unclear responsibilities in companies
Another risk: industrial control systems, production facilities and other smart infrastructure endpoints are often in company use for more than ten years. Without compliance strategies, however, there are usually no update policies in most companies either. In addition, often there is a very unclear situation around responsibilities: among the 318 company representatives surveyed, a wide variety of people and departments are responsible for IoT security. These range from CTO (16 percent) to CIO (21 percent) to Risk & Compliance Manager (22 percent) to IT Purchasing Manager (26 percent). In 21 percent of the companies, external consultants even handle the purchasing of IoT devices and systems. By contrast, only 23 percent perform the simplest security check - an analysis and testing of the included firmware for security vulnerabilities. "This is negligent. An examination of the device software takes a few minutes only, and the result clearly indicates the risks and their classification into risk levels. This process should be part of the mandatory program before and during the use of endpoints - from routers to production machines," Jan Wendenburg of ONEKEY sums up.Über Onekey
EIN SCHLÜSSEL ist der führende europäische Spezialist für Product Cybersecurity & Compliance Management und Teil des Anlageportfolios von PricewaterhouseCoopers Deutschland (PwC). Die einzigartige Kombination aus einer automatisierten Product Cybersecurity & Compliance Platform (PCCP) mit Expertenwissen und Beratungsdiensten bietet schnelle und umfassende Analyse-, Support- und Verwaltungsfunktionen zur Verbesserung der Produktsicherheit und -konformität — vom Kauf über das Design, die Entwicklung, die Produktion bis hin zum Ende des Produktlebenszyklus.
KONTAKT:
Sarah Fortmann
Leiter Marketing
sara.fortmann@onekey.com
euromarcom public relations GmbH
+49 611 973 150
team@euromarcom.de
Bereit zur automatisierung ihrer Cybersicherheit & Compliance?
Machen Sie Cybersicherheit und Compliance mit ONEKEY effizient und effektiv.