An Infoblox survey shows many companies have thousands of non-business Internet of Things devices connecting to their network daily.

4 Min Read

The task of managing unsanctioned devices on enterprise networks is becoming a whole lot harder at many organizations with the growing use of personally owned Internet of Things (IoT) products in the workplace.

Infoblox recently commissioned a survey of 1,000 IT directors in the US, UK, Germany, and the UAE to understand the security implications of shadow devices on organizational networks. Thirty-five percent of the respondents from the first three countries reported more than 5,000 non-business devices connected to their enterprise network every single day. One-third of the respondents from US, UK, and Germany reported more than 1,000 shadow-IoT devices connected to their network on a typical day.

Thirty-nine percent of the respondents from the US and UK said they used personal devices while connected to the enterprise network to access social media; 24% reported using the devices to download apps, while 13% did so to access games.

The most common unsanctioned IoT devices on enterprise networks included fitness trackers, such as Fitbit and Gear Fit; digital assistants, such as Google Home and Amazon Alexa; smart TVs; and smart kitchen devices, such as connected microwaves and kettles.

The proliferation of such devices significantly increases the security burden for organizations, says Sean Tierney, director of cyber intelligence at Infoblox. As it is, security administrators have an enormous task simply managing the sanctioned devices on the enterprise network. Over 75% of the organizations in the Infoblox survey, for instance, reported having more than 1,000 company-supplied devices, including laptops and tablets on the network.

The challenge of managing these devices has been compounded by explosion in the number of insecure and unsanctioned IoT devices being added to company networks, Tierney says. "Due to the poor security levels of many of these consumer devices, there is a very real threat posed by these connected devices operating under the radar," he says. "These insecure and vulnerable devices present a weak entry point for cybercriminals into the network, and a serious security risk to the company."

Data exfiltration is one major threat. Improperly secured IoT devices can provide cybercriminals an entry point for breaking into the broader enterprise network and stealing data from it via methods like DNS tunneling, for instance, Infoblox said in its report.

As Mirai demonstrated in late 2016, vulnerable IoT devices on enterprise networks can also be hijacked and used in large-scale distributed denial-of-service attacks and other malicious campaigns. In addition, IoT devices and networks themselves can become targets of malicious attacks, such as ransomware. "Whether it comes down to neglect or ignorance, it is clear that organizations cannot rely upon employees to follow their security policy for connected devices," Tierney says.

Exacerbating the situation is how easy it is for cybercriminals to find vulnerable IoT devices on enterprise networks. Search engines like Shodan make it trivial for criminals to find connected devices and the services they might be running like HTTP, FTP, SSSH, and SNMP. In March 2018, a search that Infoblox conducted showed there were nearly 6,000 identifiable webcams openly accessible via the Web in the UK, some 2,350 smart TVs in Germany, and 1,571 Google Home devices in the US.

Many companies appear aware of the threat. Eighty-two percent of the respondents in the Infoblox survey said their employers had policies in place for dealing with connected devices. Unfortunately, there appears to be a clear disconnect between IT leaders and employees over the effectiveness of these policies.

Eighty-eight percent of IT leaders in the US and UK believed they had an effective policy in place for mitigating security risks from connected devices. But a full 24% of employees represented in the survey said they did not even know such policies existed, while a bare 20% of the people who professed knowledge of these policies actually abided by them.

"Enterprises need to do a better job of communicating the dangers that insecure devices can pose on a company network," Tierney says. Convenience is often top of mind when users connect personal devices to the enterprise network. "Security is often an afterthought when it comes to shadow devices," he notes. The reality is that ineffective policies can cost an organization thousands of dollars in both downtime and brand reputation in the event of a cyberattack.

"Organizations need to decide if they will approach risk through mitigation, transfer, or acceptance," Tierney says. Effective policies should reflect the culture of the organization and employee behavior, in addition to the reality of the risk the organization is willing to accept. "Policies should also incorporate measures for determining their effectiveness through testing or monitoring," he says.

Related Content:

About the Author(s)

Jai Vijayan, Contributing Writer

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year career at Computerworld, Jai also covered a variety of other technology topics, including big data, Hadoop, Internet of Things, e-voting, and data analytics. Prior to Computerworld, Jai covered technology issues for The Economic Times in Bangalore, India. Jai has a Master's degree in Statistics and lives in Naperville, Ill.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights