IOT NEWS

Industrial IoT News

Industrial IoT Home

New IoT Ecosystem Report Measures 56 Million Transactions, More Than 90 Percent via Plaintext Channel

By Ken Briodagh
May 28, 2019

Zscaler, a cloud security company, recently released its 2019 report, IoT in the Enterprise: An Analysis of Traffic and Threats, which examines traffic stemming from IoT device footprints across the Zscaler cloud over the course of 30 days. The Zscaler ThreatLabZ research team analyzed 56 million IoT device transactions to understand the types of devices in use, the protocols used, the locations of the servers with which they communicated, and the frequency of inbound and outbound communications.

Over a 30-day period, 56 million transactions were processed in the Zscaler cloud from 270 different types of IoT devices made by 153 different manufacturers. The analysis reportedly showed that more than 1,000 organizations have at least one IoT device transmitting data from the network to the internet via the Zscaler cloud platform.

The most commonly detected IoT device categories across the Zscaler cloud included IP cameras, smart watches, printers, smart TVs, set top boxes, IP phones, medical devices, and data collection terminals, among others.

“As is often the case with new innovations, the use of IoT technology has moved more quickly than the mechanisms available to safeguard these devices and their users. Within only one month of traffic, our threat research team saw an astronomical amount of traffic stemming from both corporate and personal IoT devices,” said Amit Sinha, EVP, Engineering and Cloud Operations, CTO, Zscaler. “Enterprises need to take steps to safeguard these devices from malware attacks and other outside threats.”

Top IoT Security Concerns:

  • Weak default credentials
  • Plain-text HTTP communication to a server for firmware or package updates
  • Plain-text HTTP authentication
  • Use of outdated libraries

“We observed that over 90 percent of IoT transactions are occurring over a plain text channel, which we believe makes these devices and the enterprises that house them vulnerable to crafted attacks,” said Deepen Desai, VP, Security Research, Zscaler. “Enterprises need to assess their IoT footprint, as they will only continue to expand and raise the risk of  cyberattacks. From changing default credentials to restricting access to IoT devices from external networks, there are a variety of steps that can be taken to increase the IoT security posture.”




Edited by Ken Briodagh
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

Editorial Director

SHARE THIS ARTICLE
Related Articles

Semitech Semiconductor Dual-Mode Communication Platform Receives G3-PLC Hybrid Certification

By: Alex Passett    5/25/2023

Semitech Semiconductor, a provider of high-performance IoT/IIoT products, received official certification from the G3-Alliance on its SM2400 PLC+RF du…

Read More

'Warehouse Cleaning, Without Compromise' - Avidbots Launches its Neo 2W Autonomous Cleaning Robot

By: Alex Passett    5/15/2023

Purpose-built for dynamic IIoT environments, Avidbots' Neo 2W automates time-consuming, labor-intensive tasks that come with floor care.

Read More

Next-Gen Lithium-Ion Battery Packs: In-Progress Innovation from Flux Power Holdings and UL Solutions

By: Alex Passett    5/11/2023

Flux Power Holdings has completed UL Solutions' third-party, data-backed certification and compliance testing and will move on to the next phase hitti…

Read More

Emerson's SolaHD has Launched its IIoT Network Connectivity and Power Supply Solution

By: Alex Passett    5/8/2023

SolaHD, an Emerson brand, has launched its next-gen power solution for bringing network connectivity to its SDN-D power supply and its SCM, or SolaHD …

Read More

Heavy Lifting in IIoT: Alleviating Labor Shortages as Challenges Impact the Supply Chain Industry

By: Alex Passett    5/4/2023

Ivanti Wavelink recently announced the results of its "Heavy Lift: Supply Chain Trends for 2023" survey that looked at more than 200 different types o…

Read More