• About
  • Advertise
  • Careers
  • Contact
Friday, April 17, 2026
No Result
View All Result
NEWSLETTER
iotlasvegas
  • Home
  • Internet of Things
  • Security
  • Mobile
  • Networking
  • Smart Cities
  • Development
  • Data & Analytics
  • Enterprise
  • Home
  • Internet of Things
  • Security
  • Mobile
  • Networking
  • Smart Cities
  • Development
  • Data & Analytics
  • Enterprise
No Result
View All Result
iotlasvegas
No Result
View All Result
Home Internet of Things

Report: Shadow IoT is prevalent, insecure

in Internet of Things
0
SHARES
6
VIEWS
Share on FacebookShare on Twitter

While the data protection pitfalls around the Internet of Things are undeniably numerous, new research from security vendor Zscaler underlines that one of the most serious problems emanates from the growing trend of “shadow IoT,” or the use of employee-owned devices on corporate networks.

The company’s “IoT in the Enterprise 2020” report says the blurring of the line between home and office is making the enterprise network less secure, even as businesses grapple with security issues around strictly corporate IoT endpoints like data collection terminals and industrial control devices.

“[T]he analysis also showed enterprise traffic generated by unauthorized IoT devices such as digital home assistants, TV set-top boxes, IP cameras, smart home devices, smart TVs, smart watches, and even automotive multimedia systems,” the report said.

Based on an analysis of network traffic from Zscaler’s customers, the report said that fully 83% of all online IoT transactions – the term that Zscaler uses to indicate instances of communication between devices – were sent in plain text, without using SSL. That’s partially due to the fact that consumer IoT devices tend to be far less secure than enterprise-focused ones, and highlights the potential volume of insecure traffic on corporate networks.

The problem is similar to the one businesses experienced years ago as the BYOD phenomenon took place more than a decade ago. Companies’ networks were insufficiently prepared for an influx of new endpoints that they didn’t actually own, causing a rush to develop new ways to secure those networks against both accidental and opportunistic compromise.

Download Nulled WordPress Themes
Premium WordPress Themes Download
Download Premium WordPress Themes Free
Download WordPress Themes Free
download udemy paid course for free
download huawei firmware
Download Best WordPress Themes Free Download
free download udemy paid course
Tags: insecureReport: Shadow IoT is prevalent
Next Post

Cisco, Microsoft team to control growing IoT networks

Recommended

Open source personal tracking system gets first test

The Industrial IoT will give us self-healing machinery

The Industrial IoT will give us self-healing machinery

Facebook Twitter Youtube RSS

Newsletter

Subscribe our Newsletter for our latest updates.

Loading

Category

  • AI
  • Careers
  • Cloud Computing
  • Connected Cars
  • Connected Vehicles
  • Data & Analytics
  • Data Center
  • Data Centers
  • Databases
  • Development
  • Enterprise
  • Hardware
  • Healthcare
  • IIoT
  • Infrastructure
  • Internet of Things
  • IoT
  • IT Leadership
  • Manufacturing
  • Mobile
  • Networking
  • Oil & Gas
  • Open Source
  • Security
  • Smart Cities
  • Smart Homes
  • Software
  • Software Development
  • Standards
  • Technology Industry
  • Uncategorized
  • Unified Communications
  • Virtualization
  • WAN
  • Wearables

About Us

Advance IOT information site of Las Vegas USA

© 2024 https://iotlasvegas.com.

No Result
View All Result
  • Home
  • Internet of Things
  • Security
  • IoT
  • Mobile
  • Networking
  • Smart Cities
  • Development
  • Data & Analytics
  • Enterprise

© 2024 https://iotlasvegas.com.

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In