SHARE
Facebook X Pinterest WhatsApp

IoT May be a Hacker’s Delight, Both Inside and Out

thumbnail
IoT May be a Hacker’s Delight, Both Inside and Out

Back view of business woman writing internet of things on white wall background, asian

Securing IoT devices and staying ahead of certificate expiration have become top strategic priorities for IT teams

Written By
thumbnail
Joe McKendrick
Joe McKendrick
Mar 9, 2020

Security is the Achilles Heel of IoT, and IoT may be the Achille’s heel of today’s enterprise networks. Those are the conclusions of two recent industry surveys, which are sounding the alarm over the vulnerability of IoT devices to tampering, hacking or other incidents.

Three in five respondents to a Ponemon Institute and Keyfactor survey of 603 IT and security professionals (60%) say they’re adding additional layers of encryption technologies to secure IoT devices, but 46% admit low ability to maintain IoT device identities and cryptography over device lifetime.

See also: NIST Publishes Draft Security Recommendations For IoT Manufacturers

Accordingly, securing IoT devices and staying ahead of certificate expiration have become top strategic priorities for IT teams. Emerging connected devices present a significant challenge for enterprises, as attackers seek to exploit weak credentials to steal data, disrupt services or distribute malware. When asked to rank their top three strategic priorities for digital security, 48% of respondents prioritized authenticating and controlling IoT devices, while another 43% say knowing the expiration date of certificates is critical.

Another survey of 540 IT professionals from Extreme Networks reveals security precautions are “falling flat” and businesses underestimate the pervasiveness of insider threats. Eighty-four percent of organizations have IoT devices on their corporate networks. Of those organizations, 70% are aware of successful or attempted hacks, yet more than half do not use security measures beyond default passwords. “The results underscore the vulnerabilities that emerge from a fast-expanding attack surface and enterprises’ uncertainty in how to best defend themselves against breaches,’ the survey report’s authors state.

A majority of professionals, 55%, believe the main risk of breaches comes mostly from outside the organization. At the same time, more than 70% believe they have complete visibility into the devices on the network.

Nine out of 10 IT professionals are not confident that their network is secured against attacks or breaches. Financial services IT professionals are the most concerned about security, with 89% saying they are not confident their networks are secured against breaches. This is followed by the healthcare industry (88% not confident), then professional services (86% not confident). Education and government are the least concerned of any sector about their network being a target for attack.

Skills shortage and implementation complexity are also hampering security measures. One-third of all security deployment projects fail, and the top reasons for unsuccessful implementations are a lack of qualified IT personnel (37%), followed by too much maintenance cost/effort (29%), and implementation complexity (19%).

thumbnail
Joe McKendrick

Joe McKendrick is RTInsights Industry Editor and industry analyst focusing on artificial intelligence, digital, cloud and Big Data topics. His work also appears in Forbes an Harvard Business Review. Over the last three years, he served as co-chair for the AI Summit in New York, as well as on the organizing committee for IEEE's International Conferences on Edge Computing. (full bio). Follow him on Twitter @joemckendrick.

Recommended for you...

Top 5 Smart Manufacturing Articles of 2025
Building Resilient and Sustainable Industries With AI, IoT, Software-Defined Systems, and Digital Twins
Peter Weckesser
Nov 26, 2025
Adaptive Edge Intelligence: Real-Time Insights Where Data Is Born
Skype May Be Gone, but P2P Is Here To Stay

Featured Resources from Cloud Data Insights

The Difficult Reality of Implementing Zero Trust Networking
Misbah Rehman
Jan 6, 2026
Cloud Evolution 2026: Strategic Imperatives for Chief Data Officers
Why Network Services Need Automation
The Shared Responsibility Model and Its Impact on Your Security Posture
RT Insights Logo

Analysis and market insights on real-time analytics including Big Data, the IoT, and cognitive computing. Business use cases and technologies are discussed.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.