IoT Threats Are Considered Top Security Risk By 21% IT Managers in India

Parvati Misra - Oct 02, 2019


IoT Threats Are Considered Top Security Risk By 21% IT Managers in India

21% of IT managers from India consider that IoT threats are on the top of the security risk.

IT managers from India are overwhelmed with cyberattacks, which comes from every direction while hackers take advantage of the weak spots in security which results in the compromises of third party vendor or supply chain. While 27 percent of these IT managers believed that the internal staffs were the reasons behind these security risk, 21 percent considered that the Internet of Things (IoT) was the culprit behind these security threats, this was taken from a survey from global cybersecurity major Sophos on the Previous Tuesday.

Nevertheless, there was an alarming rate of 24 percent of these IT managers considered the aforementioned supply chain on the top of the security threat, which gives those cybercriminals one more target on their attack list.

Ranson

The survey had 3,100 participants, most of whom are IT shots makers from medium businesses in India, Japan, Australia, Germany, France, the UK, Brazil, Colombia, Mexico, Canada, and America.

Sunil Sharma – Sophos’s Sale Managing Director in India – states that cybercriminals have always been finding a method to infiltrate an organization, and supply chains are going up on their list of infiltrating method at the moment. Therefore, IT decision-makers should consider the supply chain as one of the top risk priorities, however, they don’t do this because most IT managers consider that the attacks are only aimed at high profile targets by nation-states.

He further states that as it is valid that some of the blueprints for the attacks were created by nation-states, and only after these the announcement of these techniques, these cybercriminals would utilize them for better success rate and their own ingenuity.

A new security solution might be needed in order to eliminate the cyber threats from supply chains attack, insecure or vulnerabilities wireless network, and software exploits. Also it a new solution might help them identify the previously hidden threats.

Sharma adds that attacking supply chains is an effective method for cybercriminals to execute active, automated attacks, where the attackers choose a victim from a larger pool of prospects and then infiltrate that specific organization using hand-to-keyboard techniques and lateral movements to avoid exposer and hit their target.   

Comments

Sort by Newest | Popular

Next Story

Read more

What is the Most Powerful Gaming Phone Currently?

Mobile- Feb 12, 2026

What is the Most Powerful Gaming Phone Currently?

The Nubia Red Magic 11 Pro is the undisputed most powerful gaming phone right now, blending record-breaking benchmarks, unbeatable cooling, and gamer-centric design for peak performance that lasts.

Top 5 Cheap and Efficient Gaming Phones in 2026

Mobile- Feb 11, 2026

Top 5 Cheap and Efficient Gaming Phones in 2026

These phones prove you don't need $1000+ for efficient gaming. The RedMagic 11 Air leads for pure power, while POCO options win on value.

Discord's Teen Safety Sham: Why This Data Leak Magnet Isn't Worth Your Trust Anymore

ICT News- Feb 10, 2026

Discord's Teen Safety Sham: Why This Data Leak Magnet Isn't Worth Your Trust Anymore

Cancel your Nitro, export your data, and move on before the next leak hits. Your personal information deserves better.