The task of managing unsanctioned devices on enterprise networks is becoming a difficult task at many organisations with the growing use of personally owned Internet of Things (IoT) products in the workplace.
Infoblox recently commissioned a survey of 1,000 IT directors in the US, UK, Germany, and the UAE to understand the security implications of shadow devices on organisational networks. Thirty-five percent of the respondents from the first three countries reported more than 5,000 non-business devices connected to their enterprise network every day. One-third of the respondents from US, UK, and Germany reported more than 1,000 shadow-IoT devices connected to their network on a typical day.
Thirty-nine percent of the respondents from the US and UK said they used personal devices while connected to the enterprise network to access social media; 24% reported using the devices to download apps, while 13% did so to access games.
The most common unsanctioned IoT devices on enterprise networks included fitness trackers, such as Fitbit and Gear Fit (49%); digital assistants, such as Google Home and Amazon Alexa (47%); smart TVs (46%); smart kitchen devices, such as connected microwaves and kettles (33%) and games consoles (30%).
The proliferation of such devices increases the security burden for organisations significantly, says Sean Tierney, director of cyber intelligence at Infoblox. As it is, security administrators have an enormous task simply managing the sanctioned devices on the enterprise network. Over 75% of the organizations in the Infoblox survey, for example, reported having more than 1,000 company-supplied devices, including laptops and tablets on the network.
The challenge of managing these devices has been compounded by explosion in the number of insecure and unsanctioned IoT devices being added to company networks, Tierney says. "Due to the poor security levels of many of these consumer devices, there is a very real threat posed by these connected devices operating under the radar," he says. "These insecure and vulnerable devices present a weak entry point for cybercriminals into the network, and a serious security risk to the company."
Data risks are a major threat. Improperly secured IoT devices can provide cybercriminals an entry point for breaking into the broader enterprise network and stealing data from it via methods like DNS tunneling, for instance, Infoblox said in its report.
IoT devices and networks themselves can become targets of malicious attacks, such as ransomware. "Whether it comes down to neglect or ignorance, it is clear that organizations cannot rely upon employees to follow their security policy for connected devices," Tierney says.
Exacerbating the situation is how easy it is for cybercriminals to find vulnerable IoT devices on enterprise networks. Search engines like Shodan make it too easy for criminals to find connected devices and the services they might be running like HTTP, FTP, SSSH, and SNMP. In March 2018, a search that Infoblox conducted showed there were nearly 6,000 identifiable webcams openly accessible via the Web in the UK, some 2,350 smart TVs in Germany, and 1,571 Google Home devices in the US.
Many companies seem to be aware of the threat. Eighty-two percent of the respondents in the Infoblox survey said their employers had policies in place for dealing with connected devices. But, there appears to be a clear disconnect between IT leaders and employees over the effectiveness of these policies.
Eighty-eight percent of IT leaders in the US and UK believed they had an effective policy in place for mitigating security risks from connected devices. But an amazing 24% of employees represented in the survey said they did not even know such policies existed, while a bare 20% of the people who professed knowledge of these policies actually abided by them.
"Enterprises need to do a better job of communicating the dangers that insecure devices can pose on a company network," Tierney says. Convenience is often top of mind when users connect personal devices to the enterprise network. "Security is often an afterthought when it comes to shadow devices," he notes. The reality is that ineffective policies can cost an organization large losses in both downtime and brand reputation in the event of a cyberattack.
"Organizations need to decide if they will approach risk through mitigation, transfer, or acceptance," Tierney says. Effective policies should reflect the culture of the organisation and employee behavior, in addition to the reality of the risk the organisation is willing to accept. "Policies should also incorporate measures for determining their effectiveness through testing or monitoring," he says.
The report can be found here.