Workplace IoT Puts Companies on Notice for Smarter Security
Blacklisting every "thing" in sight and banning connections to the corporate network may sound tempting, but it's not a realistic strategy.
September 6, 2017
The security threats posed by the proliferation of Internet of Things (IoT) devices are top of mind for security practitioners, and with good reason.
Gartner projects 8.4 billion connected things will be in use this year, and that includes far too many devices with vulnerabilities that are a recipe for disaster. IoT devices should have secure passwords that can automatically be updated with the most current patches. Too often, though, that is not the case. In the rush to market, devices are manufactured and shipped with easy-to-guess passwords and outdated operating systems, making devices such as webcams, surveillance cameras, and baby monitors relatively easy targets for attackers.
But it's not just at home where IoT devices can invite disaster. IoT security risks often play out in the workplace. We are a gadget-loving society, especially the younger generations, so it's no surprise to see that employees expect to take their smart watches, fitness devices, and other connected devices to work. Consequently, in ISACA's State of Cyber Security 2017 research, only 13% of respondents indicated their enterprise is unconcerned with IoT in the workplace.
Given the understandable unease, employers may be tempted to take a knee-jerk approach and ban employees from using their connected devices in the workplace, similar to what they did when people started taking smartphones to work. But organizations should avoid that inclination and instead focus on providing clear instructions for how employees can safely and appropriately use their devices in a way that does not put the organization at risk. Otherwise, current and prospective employees may look for a friendlier workplace to take their devices — and their talents.
Putting a sound IoT policy in place — with emphasis on separate network segments for employee-owned devices — is a far better alternative. The policy should address issues such as whether devices will be allowed to connect to the Internet and how to handle devices capable of recording sound or video. If connections to the Internet are allowed, devices should be funneled to a guest or other network segment that is not connected to the corporate network. That way, if those devices are infected or tampered with, they do not spread the infection to the internal network. A monitoring component is also necessary to ensure that unapproved devices are blocked.
There are, however, some connected devices that legitimately rely upon connections to the internal enterprise network — think medical devices at hospitals or clinics that are storing critical data in an internal storage area on the network. These devices should be connected to the enterprise network, but without Internet connectivity that could enable external attacks. Whenever possible, such devices should be locked down so that only trusted apps approved by IT are installed on them.
Organizations committed to sound IoT security also must factor in employee training. If a smart TV is purchased for a conference room, does it need to be connected to the Internet? Should the microphone be turned on? Are staff members allowed to take photos of whiteboards, and if so, to whom could that data eventually be accessible? Most employers would struggle with those answers — and likely not even have thought to ask the questions, underscoring the need for training.
These dynamics are only going to become more pronounced in the foreseeable future. We're still much closer to the beginning than the end of the attack cycle leveraging IoT devices. But as valid as the security concerns are — and I hear them all the time from my colleagues in the industry — blacklisting everything in sight and banning connected devices from the workplace is not a realistic approach.
Instead, having sound policies in place, making effective use of network segmentation, and monitoring the corporate network diligently will position organizations to operate securely, without alienating their workforce.
Related Content:
Learn from the industry’s most knowledgeable CISOs and IT security experts in a setting that is conducive to interaction and conversation. Click for more info and to register.
About the Author
You May Also Like
The State of Attack Surface Management (ASM), Featuring Forrester
Nov 15, 2024Applying the Principle of Least Privilege to the Cloud
Nov 18, 2024The Right Way to Use Artificial Intelligence and Machine Learning in Incident Response
Nov 20, 2024Safeguarding GitHub Data to Fuel Web Innovation
Nov 21, 2024