April 2017 Digital Edition

Click Here

March 2017 Digital Edition

Click Here

Feb. 2017 Digital Edition

Click Here

January 2017 Digital Edition

Click Here

Nov/Dec 2016 Digital Edition

Click Here

Oct 2016 Digital Edition

Click Here

Technology Sectors

Market Sectors

ISACA survey: wide gap between consumers' and IT professionals' perceptions on IoT security

Christos Dimitriadis, ISACA

Rolling Meadows, IL, October 14 - Is the Internet of Things safe? A new survey from global cyber security association ISACA suggests a major confidence gap about the security of connected devices between the average consumer and cyber security and information technology professionals.

According to the consumer segment of ISACA’s 2015 IT Risk/Reward Barometer, 64 percent of US consumers are confident they can control the security on the Internet of Things (IoT) devices they own. Yet according to more than 7,000 global IT and cyber security professionals who responded to a parallel survey, only 22 percent feel this same confidence about controlling who has access to information collected by IoT devices in their homes.

Consumers in the UK, India, Australia and Mexico are similarly confident in their cyber self-defense skills, and the majority consider themselves knowledgeable or very knowledgeable about the IoT. This number ranges from 95 percent of Indian consumers to 76 percent of UK consumers. The global average estimated number of Internet of Things devices in the home was six. Smart TVs topped the list of most wanted connected device to buy in the next 12 months, with wearable devices, such as smart watches and fitness trackers, also highly ranked.

The Hidden Internet of Things

ISACA’s survey of global IT and cybersecurity professionals depicts an IoT that flies below the radar of many IT organizations—an invisible risk that survey respondents believe is underestimated and under-secured:

  • Nearly half believe their IT department is not aware of all of their organization’s connected devices (e.g., connected thermostats, TVs, fire alarms, cars)
  • 73 percent estimate the likelihood of an organization being hacked through an IoT device is medium or high
  • 63 percent think that the increasing use of IoT devices in the workplace has decreased employee privacy

The IoT for business-to-business use alone is expected to expand from 1.2 billion devices in 2015 to 5.4 billion connected devices worldwide by 2020, according to one estimate.*

“In the hidden Internet of Things, it is not just connectivity that is invisible. What is also invisible are the countless entry points that cyber attackers can use to access personal information and corporate data,” said Christos Dimitriadis, Ph.D., CISA, CISM, CRISC, international president of ISACA, group director of Information Security for INTRALOT. “The rapid spread of connected devices is outpacing an organization’s ability to manage it and to safeguard company and employee data.”

However, the business risk of not embracing the IoT and falling behind competitors may well outweigh any potential cost of a cyberattack, noted Dimitriadis. He added that organizations need to manage the risk to achieve the most benefit.

According to global cyber security and IT professionals surveyed, device manufacturers are falling short. Seventy-two percent say they do not believe that manufacturers are implementing sufficient security measures in IoT devices. A nearly equal proportion (73 percent) don’t think current security standards sufficiently address the IoT and believe that updates and/or new standards are needed. Privacy is also an issue; 84 percent believe that device makers don’t make consumers sufficiently aware of the type of information the devices can collect.

ISACA’s consumer research suggests that consumers are likely to value businesses that can demonstrate their expertise in and commitment to cyber security best practices: globally, the majority of consumers say it is important that data security professionals hold a cyber security certification if they work at organizations with access to the consumers’ personal information (US 89 percent, Australia 93 percent, India 96 percent, Mexico 98 percent, UK 90 percent).

“Device manufacturers should lead the charge on adopting an industry-wide security standard that addresses IoT security, and put in place rigorous security governance and professional development for their cyber security employees. ISACA’s research shows a direct connection between positive customer sentiment and companies that can demonstrate security credentials,” said Robert Clyde, CISM, international vice president of ISACA and managing director of Clyde Consulting LLC.

Ways for Enterprises to Maintain a Cyber-Secure Workplace

  • Safely embrace IoT devices in the workplace to keep competitive advantage
  • Ensure all workplace devices owned by organization are updated regularly with security upgrades
  • Require all devices be wirelessly connected through the workplace guest network, rather than internal network
  • Provide cyber security training for all employees to demonstrate their awareness of best practices of cyber security and the different types of cyberattacks

Best Practices for Manufacturers of IoT Devices

  • Require all developers who build software to have appropriate performance-based cyber security certification, to ensure safe coding practices are being followed
  • Insist all social media sharing be opt-in
  • Encrypt all sensitive information, especially when connecting to Bluetooth-enabled devices
  • Build IoT devices that can be automatically updated with new security upgrades

About the Risk/Reward Barometer

The annual IT Risk/Reward Barometer is a global indicator of trust in information. Conducted by ISACA, the Barometer polls thousands of IT and cybersecurity professionals and consumers worldwide to uncover attitudes and behaviors about essential technologies and information, and the trade-offs people make to balance risk and reward. The study is based on online polling of 7,016 ISACA members in 140 countries from 27 August to 8 September 2015. Additional online surveys were fielded by M/A/R/C Research among 1,227 consumers in the US, 1,025 consumers in the UK, 1,060 consumers in Australia, 1,027 consumers in India and 1,057 consumers in Mexico. The US survey ran 17-20 August 2015, and the UK, Australia, India and Mexico surveys ran 21-30 August 2015. At a 95 percent confidence level, the margin of error for each individual country sample is +/- 3.1 percent. To see the full results, visit here. 

About ISACA

ISACA® helps global professionals lead, adapt and assure trust in an evolving digital world by offering innovative and world-class knowledge, standards, networking, credentialing and career development. Established in 1969, ISACA is a global nonprofit association of 140,000 professionals in 180 countries. ISACA also offers the Cybersecurity Nexus™ (CSX), a holistic cybersecurity resource, and COBIT®, a business framework to govern enterprise technology.

 

Recent Videos

HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and gates, access networks and services, and make cashless payments using phones and other mobile devices. ...
Mobile device forensics can make a difference in many investigations, but you need training that teaches you how to get the most out of your mobile forensics hardware and software, and certifies you to testify in court. Read this white paper to learn how to evaluate mobile forensics training...
PureTech Systems is a software company that develops and markets PureActiv, its geospatial analytics solution designed to protect critical perimeters and infrastructure.  Its patented video analytics leverage thermal cameras, radars and other perimeter sensors to detect, geo-locate, classify, and...
PureTech Systems is a technology leader in the use of geospatial video, focusing on perimeter security.  When combining geospatial capabilities with video analytics and PTZ camera control, managers of critical facilities can benefit by allowing the video management system to aid them in the process...