SHARE
Facebook X Pinterest WhatsApp

IoT Devices Still Exposed, Vast Majority of Traffic Unencrypted

thumbnail
IoT Devices Still Exposed, Vast Majority of Traffic Unencrypted

Network of internet of things attacked by a hacker on one node

As IoT use cases continue to grow, lax security practices such as retaining default passwords and not implementing updates and patches in a timely manner remain a problem.

Written By
thumbnail
David Curry
David Curry
Apr 8, 2020

With all of the Internet of Things hacks over the past five years, one would expect the industry to massively improve security standards and businesses to be more careful installing these devices.

Sadly, manufacturer-set passwords and encryption remain lackluster, while businesses continue to add unsecured devices to their IT system. Some big operators have made steps in the right direction, but as Unit 42’s IoT threat report reveals, there’s still a way to go.

SEE ALSO: The Internet of Things May be a Hacker’s Delight, Both Inside and Out

One of the most shocking key findings on the report is 98 percent of IoT device traffic remains unencrypted. That means if a hacker were to plant themselves inside the network, they would be able to listen and collect all network traffic.

Unit 42 analyzed IoT devices used by healthcare organizations, which regularly send confidential information on patients over their IT network. If a hacker were to intercept this information, it could be used as blackmail or sold on the dark web.

Most IoT Devices Still Run Windows 7

Not only do most devices come with minimal security, but according to Unit 42, 83 percent of medical imaging devices run on unsupported operating systems. 56 percent run Windows 7, which Microsoft put into end of life stage in January.

Analysis of recent IoT attacks has led Unit 42 to see a shift in hacker’s priority, previously most were used as part of botnets to send DDoS attacks, now they are primarily the gateway for malware to spread across an organization’s network.

Around five billion IoT endpoints are currently in use and that is increasing by about 20 percent every year. While the use cases for IoT devices continues to grow, the security measures put in place remain stuck in the early 2010s. California’s SB-327 IoT law may force manufacturers to wake up to the fact IoT needs more security, but businesses need to also look into additional measures.

Unit 42 suggests that businesses patch printers and other older devices, segment IoT devices from the main network, and enable active monitoring.

thumbnail
David Curry

David is a technology writer with several years experience covering all aspects of IoT, from technology to networks to security.

Recommended for you...

Top 5 Smart Manufacturing Articles of 2025
Building Resilient and Sustainable Industries With AI, IoT, Software-Defined Systems, and Digital Twins
Peter Weckesser
Nov 26, 2025
Adaptive Edge Intelligence: Real-Time Insights Where Data Is Born
Skype May Be Gone, but P2P Is Here To Stay

Featured Resources from Cloud Data Insights

The Difficult Reality of Implementing Zero Trust Networking
Misbah Rehman
Jan 6, 2026
Cloud Evolution 2026: Strategic Imperatives for Chief Data Officers
Why Network Services Need Automation
The Shared Responsibility Model and Its Impact on Your Security Posture
RT Insights Logo

Analysis and market insights on real-time analytics including Big Data, the IoT, and cognitive computing. Business use cases and technologies are discussed.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.