SHARE
Facebook X Pinterest WhatsApp

IoT Security: Unsecured Devices Could Lead to ‘Catastrophic’ Cybersecurity Attack

76% of survey respondents say a DDoS attack involving an unsecured IoT device is likely to occur within the next two years.

Written By
thumbnail
Sue Walsh
Sue Walsh
Jun 1, 2017

The Ponemon Institute, an independent research firm focused on privacy, data protection and information security policy, and the Shared Assessments Program, the industry-standard body on third party risk assurance, released findings from its annual survey, The Internet of Things (IoT): A New Era of Third Party Risk.

The report surveyed 553 professionals who have a role in risk management in industries including healthcare and financial services. They were asked for their perception of IoT risk, current governance, and the state of third-party risk management programs.

Key findings of the report include:

  • 76% say a DDoS attack involving an unsecured IoT device is likely to occur within the next two years.
  • 94% of those surveyed noted that a security incident related to unsecured IoT devices or applications could be catastrophic.
  • 69% of respondents don’t keep their CEO and board informed about the effectiveness of the third party risk management program.
  • Only 44% say their organization has the ability to protect their network or enterprise systems from risky IoT devices.
  • 77% of respondents aren’t considering IoT-related risks in their third-party due diligence.
  • 67% of those surveyed are not evaluating IoT security and privacy practices before engaging in a business relationship.

IoT security

“More and more enterprises are turning to IoT to improve business outcomes and this growth is creating a breeding ground for cyber attacks,” said Dr. Larry Ponemon, chairman and founder of the Ponemon Institute. “What’s shocking about these findings is the complete disconnect between understanding the severity of what a third party security breach could mean for businesses, and the lack of preparedness and communication between departments.”

The respondents said they’re aware that IoT introduces new security risks into their organizations, but only 25% said their boards require assurances that IoT risks are being managed and monitored. The majority are still relying on legacy solutions, with 94% saying they are still using traditional network firewalls.

“Ready or not, IoT third-party risk is here. Given the proliferation of connected devices, today’s cyber climate is evolving and organizations have to shift their focus to the security of external parties, now more than ever,” said Charlie Miller, senior vice president with the Shared Assessments Program. “In order to avoid becoming the next big headline, our security tactics have to evolve along with the threats. New technology and practices are needed to ensure security, and this starts by communicating the risks to the right people and acknowledging potential devastating outcomes when engaging with a third party. Avoiding these problems can no longer be the solution.”

Advertisement

Cybersecurity

thumbnail
Sue Walsh

Sue Walsh is News Writer for RTInsights, and a freelance writer and social media manager living in New York City. Her specialties include tech, security and e-commerce. You can follow her on Twitter at @girlfridaygeek.

Recommended for you...

Open Source Talent Shortage Expected To Increase in 2022
David Curry
Jul 12, 2022
Volvo Puts IoT and AI in the Driver’s Seat for Vehicle Connectivity
Sue Walsh
Nov 6, 2020
Cybersecurity and Digital Trust Companies Team for IoT Threats Detection
Sue Walsh
Oct 12, 2020
Cornell Researchers Create the Country’s First Statewide IoT Network
Sue Walsh
Oct 9, 2020

Featured Resources from Cloud Data Insights

The Difficult Reality of Implementing Zero Trust Networking
Misbah Rehman
Jan 6, 2026
Cloud Evolution 2026: Strategic Imperatives for Chief Data Officers
Why Network Services Need Automation
The Shared Responsibility Model and Its Impact on Your Security Posture
RT Insights Logo

Analysis and market insights on real-time analytics including Big Data, the IoT, and cognitive computing. Business use cases and technologies are discussed.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.