perle-logo perle-logo perle-logo
  • Contact Us
  • PRODUCTS
  • APPLICATIONS
  • HOW TO BUY
  • SUPPORT
  • ABOUT PERLE
  1. Industry News
  2. New report finds over 90% of IoT device transactions are unencrypted
  3. Print Friendly Version of this pagePrint Get a PDF version of this webpagePDF

5/28/2019

New report finds over 90% of IoT device transactions are unencrypted

Max Burkhalter

New report finds over 90% of IoT device transactions are unencrypted

Internet-of-things devices are becoming increasingly common in nearly every industry across the world, as they have helped enterprises improve efficiency, expand communications and automate a range of critical operations. However, the lack of cybersecurity standardization has created significant issues for companies and their customers, leading many to question how viable IoT will be in the years to come. Despite the skepticism, many enterprises have continued to ramp up their investment efforts - IoT spending is predicted to pass the $1 trillion mark by 2022, according to the International Data Corporation. Considering the rapid pace of IoT adoption shows no signs of slowing down, it's important to consider the potential impact that existing and emergent security threats might have on tech-enabled businesses.

Enterprises fail to encrypt IoT transactions
In late May, Zscaler released a new report that analyzed over 56 million IoT device transactions from 1,051 enterprise networks to help organizations better understand their risk exposure. The network security firm collected telemetry and traffic data from its Zscaler cloud product between March and April 2019, finding that 91.5% of all data transactions performed by IoT devices on corporate networks were unencrypted. Some of the study's more specific findings include:

  • 41% of IoT devices did not use any Transport Layer Security
  • 41% only used TLS for some connections
  • 18% used TLS encryption to protect all traffic

The lack of robust encryption leaves enterprise IoT devices exposed to a variety of cyber threats, from man-in-the-middle attacks to malware infections like Mirai, Rift and Gafgyt. Hackers often use these techniques to intercept massive volumes of sensitive data that can be sold on black market websites or used to commit identity theft. Additionally, many enterprises have been slow to update their device credentials, making it easy for cybercriminals to gain access through default usernames and passwords. But what specific IoT devices are at risk?

Different IoT devices arranged to spell IOTAny IoT device with the ability to send and receive data could pose a risk to enterprise networks.

At-risk IoT devices
Zscaler's study found that the most common IoT devices were "set-top boxes used for video decoding," which accounted for more than 50% of observed hardware on corporate networks. These devices allow smart TVs, presentation systems and wearables to receive, decode and display digital signals, making them a prime target for would-be hackers. That said, data collection terminals represented the biggest risk to network and device security, as they generated over 80% of all outbound data transactions reviewed by the study. Overall, researchers at Zscaler identified around 270 unique IoT profiles from 153 different device manufacturers, including IP cameras, smart printers, medical devices, digital home assistants and a whole lot more.

Every unsecured IoT device represents a possible entry point for hackers, making robust cybersecurity infrastructure essential to every enterprise network's long-term stability. Perle offers high-performance connectivity tools that support scalability and complex security protocols. Read some of our customer stories to find out how we've helped other organizations protect their data transactions.

Related Articles
  • How creative IoT deployments are transforming the hospitality industry
  • Merging physical and digital retail experiences with IoT
  • Health care improvements set to come from 5G connections and the IoT
Related Products
Error processing SSI file
Back to top

Products

Applications

About Perle

Contact Us

How to Buy

Technical Support

Site Map

Legal Information

Privacy & Cookie Policy

Products by Perle

specialix Chase Research

Follow Perle

Go to Perle Systems Facebook link
Go to Perle Systems Twitter link
Go to Perle Systems Linkedin page
Go to Perle Systems rss feed

Copyright © 1996 - 2021 Perle. All Rights Reserved

×

Trusted by renowned brands

  • Amazon
  • Cisco
  • Boeing

Why us?

Technical Support icon
Technical Support

If you need a technical consultation (by phone or email) to help you choose the best Products for your application, Perle is easy to reach and has technical engineers you can talk to. We have sales and technical support staff around the globe to support you when you need it.

Trust icon
Trust

Perle has been providing reliable device connectivity solutions since 1976. That’s over 40 years of experience that businesses around the globe have come to trust to deliver superior connectivity technology for mission critical applications.

Send us an Email

Have a Question?

We can provide more information about our products or arrange for a price quotation.


email-iconSend an Email
contactus-iconSend an Email callus-iconCall Us