IoT security is also making strides.

Please provide the information below to view the online Mobile Security Index Report.

The information provided will be used in accordance with our terms set out in our Privacy Notice. Please confirm you have read and understood this Notice.

By submitting the form, you are agreeing to receive insights, reports and other information from Verizon and affiliated companies in accordance with our Privacy Policy. California residents can view our California Privacy Notice.

Verizon may wish to contact you in the future concerning its products and/or services. If you would like to receive these communications from Verizon, indicate by selecting from the dropdown menu below. Please note that you can unsubscribe or update your preferences at any time.

Indicates a required field. The content access link will be emailed to you.

View only

Thank You.

Thank you.

You will soon receive an email with a link to confirm your access, or follow the link below.

Download this document

Thank you.

You may now close this message and continue to your article.

More good news: Greater awareness is driving more investment in IoT security. And the expanding use of IoT security best practices, such as deploying organization-wide standards, centralizing coordination of IoT projects and devices, and applying more oversight for IoT projects, are also impacting IoT security spending.

Keeping a close eye on “things”

Among survey respondents who have deployed IoT devices, nearly all have applied at least some IoT security practices, and most are monitoring the effectiveness of encryption measures applied within IoT frameworks. Nearly four in five (79%) use automated tools for this purpose, while just under one-half (46%) are still relying on manual audits or third-party assessments.

93%

of IoT users have applied at least some IoT security best practices.

96%

use automated solutions to monitor the effectiveness of the encryption measures used to protect IoT device data.

70%

of IoT users have applied role-based access control to provision access to their devices.

The majority of respondents (69%) and automatically apply security patches to all of the IoT devices in their organizations. We can take this as a positive, in that modern IoT security practices are happening fairly widely. But it’s also a negative result given how cyberattacks work. Cyberattacks are like water; threat actors find “leaks,” or gaps in coverage, and exploit them to launch an attack. The 31% of respondents citing no systems in place to automatically track and patch all IoT devices are shouldering substantial risk.

Let’s
connect

Call Sales
877-297-7816

Chat with us
Start live chat

 

Have us contact you
Request a call