Virima V6.0 will soon be available with an all-new look, enhanced discovery, mapping and vulnerability features and more. Stay tuned!

Is Your IT Ready for the Internet of Things?

IT should be ready to face unexpected cyberattacks, power outages & importantly the future of IoT

The Internet of Things (IoT) is exploding, with experts predicting there will soon be billions of connected, “smart” devices ranging from fitness monitors to door locks, video cameras, and coffee makers. Herewith, why you should care, and what you should do about it.

The IoT In Brief: Growing Use, Growing Risks for Business

New IoT devices are brought to market almost weekly. Many are consumer-focused, but business are deploying IoT devices as well. Video cameras and monitors, loading dock locks and scanners, and even break room coffee machines and refrigerators are gaining network connections and interfaces with icons and touchscreens.

However, Internet of things devices can create serious cyber security risks. In February, Security Boulevard published “The Looming Enterprise IoT Security Threat.” That report made three sobering points.

  • The growing business use of IoT devices creates an expanded attack surface for hackers, since most of those devices lack basic security controls, don’t allow patching, and are often poorly monitored.
  • Most businesses have little to no idea of the number or types of Internet of things devices connected to their networks, which means they have incomplete pictures of their true risk postures.
  • Because many IoT devices have no features for security or updates and are poorly monitored, once connected to a network, the risks they create can linger indefinitely.

In March, TechRepublic reported on a Ponemon Institute survey of more than 600 corporate governance and risk oversight professionals.

  • 97 percent said a security incident related to unsecured IoT devices could be “catastrophic” for their organizations.
  • 81 percent said a data breach caused by an unsecured IoT device was likely to occur within the next 24 months.
  • 46 percent said they have policies in place to disable an IoT device that posed a risk to their organizations, but only 15 percent said they have an inventory of most of their IoT applications.
  • 88 percent said the lack of centralized security control was the primary obstacle to complete inventories of IoT resources.
  • The average number of workplace IoT connections is expected to rise from nearly 16,000 in 2017 to nearly 25,000 in 2018.

In May, Dark Reading reported on a survey of some 1,000 IT directors in the U.S., the UK, Germany, and the UAE. “Thirty-five percent of the respondents from the first three countries reported more than 5,000 non-business devices connected to their enterprise network every single day. One-third of the respondents from US, UK, and Germany reported more than 1,000 shadow-IoT devices connected to their network on a typical day.”

The IoT: What to Do

You cannot manage or secure what you can’t see and don’t know about. This means you need to be able to discover and map all of the assets and connections on your network, and to keep that information accurate, complete, and up to date. You also need to be able to map, visualize, and keep tabs on the relationships that link your IT assets to their users and the tasks they perform.

Once you have achieved the ability to discover and map your assets, you can begin to manage them effectively. Effective IT asset management (ITAM) means you can impose policies that govern connections to your network consistently and reliably. In some cases, those policies may need to include a ban on devices that cannot be adequately secured, patched, or updated.

Discovery and ITAM tools from Virima can help you support and manage IoT devices and connections while minimizing security risks. They can automatically capture and inventory data about the IoT devices that provide it. They can also help you identify, further scrutinize, and isolate those that don’t, to maximize protection against device hijackers and hackers.

They can map dependencies, visualize relationships, and provide accurate, complete, timely information about your environment. These benefits can help make your environment more stable, secure, responsive, and valuable to your business. Learn more about Virima’s solutions for Discovery, ITAM, and IT Service Management (ITSM), and how they can help you #CoverYourAssets, here.

Summary:

The IoT In Brief: Growing Use, Growing Risks for Business

The Internet of Things (IoT) is exploding, with experts predicting there will soon be billions of connected, “smart” devices ranging from fitness monitors to door locks, video cameras, and coffee makers. New IoT devices are brought to market almost weekly. Many are consumer-focused, but business are deploying IoT devices as well. Video cameras and monitors, loading dock locks and scanners, and even break room coffee machines and refrigerators are gaining network connections and interfaces with icons and touchscreens. You cannot manage or secure what you can’t see and don’t know about. This means you need to be able to discover and map all of the assets and connections on your network, and to keep that information accurate, complete, and up to date. You also need to be able to map, visualize, and keep tabs on the relationships that link your IT assets to their users and the tasks they perform.

Subscribe to Our Newsletter

More to Explore

Table of contentsIT Asset Management (ITAM) is an important part of every IT organizationManaging devices includes managing the entire lifecycle of assetsCybersecurity asset management elevates ITAM to the next levelITAM vs CSAM: Which is a better investment?Stay ahead of all…

Table of contentsThe most important concepts in the CMDBRelationship with other CMDB componentsDifferences between CI relationships and CI dependenciesWhat are configuration item (CI) relationships?Why do you need to define CI relationships?What are configuration item (CI) dependencies?Why do you need to…

Table of contentsIT discovery can be an effective tool for vulnerability managementStaying ahead of cyber threatsVirima Discovery uncovers vulnerabilities and automatically remediates them  Most of the world's largest companies have hit the headlines for all the wrong reasons due to…

As an IT manager, keeping up with emerging cybersecurity threats is daunting. With asset management taking on increasing importance in the digital age, failing to protect your data can have serious implications. For example, the SolarWinds Orion attack in late…

Table of contentsWhat is agentless asset discovery?Agent vs. agentless discoveryBenefits of using agentless discoveryWhen to use agentless discovery?How Virima’s agentless discovery streamlines the discovery processStreamline your IT asset discovery process with Virima What is agentless asset discovery? Agentless asset discovery…

The IT asset discovery process is an essential part of modern IT management. With the massive adoption of hardware and software and the cost of these technologies, it becomes necessary to ensure they are tracked and inventoried. An IT asset…

Table of contentsThe evolving role of ITIT service mapping – the journey so farThe ViVID advantageGetting the most out of your ServiceNow investmentWhen a single solution is not enough The IT department of the future isn't just about server farms…

Table of contentsWhat is IT discovery?Why is a good IT discovery process important?Why should you invest in IT asset discovery1. Invest in the right technology2. Gain visibility of your digital environment3. A proactive security process4. Stay compliant with data security…

Table of contentsUnderstanding the service ecosystemIdentifying the change eventsPrioritizing service impactService mapping is critical to your change management plan1. No more guesswork about ‘what changed’ in your IT environment2. Identify quickly what caused a service outage and respond immediately3. Determine…

Table of contentsKeeping CMDB accurate and up-to-date with application dependency mapping Reducing IT complexity with dynamic visualization of complex CMDB relationshipsAddressing security vulnerabilities on a day-to-day basisStrengthening regulatory compliance Cloud migration and cloud cost optimizationLowering overall IT investment by streamlining operationsTackle your…