IoT Threats Are Considered Top Security Risk By 21% IT Managers in India

Parvati Misra - Oct 02, 2019


IoT Threats Are Considered Top Security Risk By 21% IT Managers in India

21% of IT managers from India consider that IoT threats are on the top of the security risk.

IT managers from India are overwhelmed with cyberattacks, which comes from every direction while hackers take advantage of the weak spots in security which results in the compromises of third party vendor or supply chain. While 27 percent of these IT managers believed that the internal staffs were the reasons behind these security risk, 21 percent considered that the Internet of Things (IoT) was the culprit behind these security threats, this was taken from a survey from global cybersecurity major Sophos on the Previous Tuesday.

Nevertheless, there was an alarming rate of 24 percent of these IT managers considered the aforementioned supply chain on the top of the security threat, which gives those cybercriminals one more target on their attack list.

Ranson

The survey had 3,100 participants, most of whom are IT shots makers from medium businesses in India, Japan, Australia, Germany, France, the UK, Brazil, Colombia, Mexico, Canada, and America.

Sunil Sharma – Sophos’s Sale Managing Director in India – states that cybercriminals have always been finding a method to infiltrate an organization, and supply chains are going up on their list of infiltrating method at the moment. Therefore, IT decision-makers should consider the supply chain as one of the top risk priorities, however, they don’t do this because most IT managers consider that the attacks are only aimed at high profile targets by nation-states.

He further states that as it is valid that some of the blueprints for the attacks were created by nation-states, and only after these the announcement of these techniques, these cybercriminals would utilize them for better success rate and their own ingenuity.

A new security solution might be needed in order to eliminate the cyber threats from supply chains attack, insecure or vulnerabilities wireless network, and software exploits. Also it a new solution might help them identify the previously hidden threats.

Sharma adds that attacking supply chains is an effective method for cybercriminals to execute active, automated attacks, where the attackers choose a victim from a larger pool of prospects and then infiltrate that specific organization using hand-to-keyboard techniques and lateral movements to avoid exposer and hit their target.   

Comments

Sort by Newest | Popular

Next Story