Infoblox research finds explosion of personal and IoT devices on enterprise networks introduces immense security risk
Source: Procre8 for Infoblox , Author: Posted by BI-ME staff
Posted: Mon May 14, 2018 1:24 pm

UAE.  Infoblox Inc., the network control company that provides Actionable Network Intelligence, today announced new research that exposes the significant threat posed by shadow devices on enterprise networks.

The report titled “What’s lurking on your network: Exposing the threat of shadow devices” found that enterprise networks across the US, UK and Germany have thousands of shadow personal devices - such as laptops, kindles and mobile phones - and Internet of Things (IoT) devices – such as digital assistants and smart kitchen appliances – connecting to their network.

Over a third of companies in the US, UK and Germany (35 percent) reported more than 5,000 personal devices connecting to the network each day. Employees in the US and UK admitted to connecting to the enterprise network for a number of reasons, including to access social media (39 percent), as well as to download apps, games and films (24 percent, 13 percent and 7 percent respectively). These practices open organizations up to social engineering hacks, phishing and malware injection.

Conversely, just 16 percent of IT directors in the UAE reported having more than 500 personal devices connecting to their networks.

Ashraf Sheet, Regional Director Middle East & Africa at ‎Infoblox says, “It is clear that organisations cannot rely upon employees to follow their security policy for connected devices. Network and security professionals must actively manage the threat introduced by shadow devices by restricting access to certain sites, adopting a solution that provides full visibility of all devices and securing the enterprise DNS infrastructure.”

A third of companies in the US, UK and Germany have more than 1,000 shadow IoT devices connected to their network on a typical day, with 12 percent of UK organizations reporting having more than 10,000.

The most common devices found on enterprise networks included:
- Fitness trackers, such as FitBit or Gear Fit – 49 percent
- Digital assistants, such as Amazon Alexa and Google Home – 47 percent
- Smart TVs – 46 percent
- Smart kitchen devices, such as connected kettles or microwaves – 33 percent
- Games consoles, such as Xbox or PlayStation – 30 percent

Such devices are easily discoverable by cybercriminals online via search engines for internet-connected devices, like Shodan, which provides even lower level criminals with an easy means of identifying a vast number of devices on enterprise networks that can then be targeted for vulnerabilities.

For example, in March 2018:
- There were 5,966 identifiable cameras deployed in the UK
- There were 2,346 identifiable Smart TVs deployed in Germany
- There were 1,571 identifiable Google Home deployed in the US

To manage the security threat posed by shadow personal devices and IoT devices in the network, 82 percent of organizations have introduced a security policy for connected devices. However, IT directors appear misguided in their estimation for how effective these policies are.

While 88 percent of the IT leaders that responded to the survey believe that their security policy is either effective or very effective, nearly a quarter of employees from the US and UK that we surveyed (24 percent) did not know if their organization had a security policy.

Of those that reported that their organization did have a security policy for connected devices, 20 percent of UK respondents claimed they either rarely, or never, follow it. And, only one fifth of respondents in the US and UK reported that they followed it by the book.

Gary Cox, Technology Director, Western Europe at Infoblox commented: “Due to the poor security levels of many consumer and IoT devices, there is a very real threat posed by those operating under the radar of organisations’ traditional security policies. These devices present a weak entry point for cybercriminals into the network, and a serious security risk to the company.”

“Networks need to be a frontline defence; second only to having good end user education and appropriate security policies. Gaining full visibility into all connected devices, whether on premise or while roaming, as well as using intelligent DNS solutions to detect anomalous and potentially malicious communications to and from the network, can help security teams to detect and stop cybercriminals in their tracks.”

Photo Caption: Ashraf Sheet, Regional Director Middle East & Africa at ‎Infoblox

About the survey 
Infoblox commissioned the survey of 1,000 IT directors across the US, UK, Germany and the UAE (300 each in the UK, US and Germany and 100 in the UAE). The research was conducted online by polling company Censuswide, an international research organisation, in March - April 2018. A survey of 1,000 employees in the US and UK between the ages of 20-65 (500 in each region) was conducted by online survey application CitizenMe in March 2018.

Photo Captions:
1. (above)  ‎Ashraf Sheet, Regional Director Middle East & Africa at ‎Infoblox
2. (inset)  For illustrative purposes only (File photo)

About Infoblox
Infoblox delivers Actionable Network Intelligence to enterprise, government, and service provider customers around the world. As the industry leader in DNS, DHCP, and IP address management, the category known as DDI, Infoblox (www.infoblox.com) provides control and security from the core—empowering thousands of organisations to increase efficiency and visibility, reduce risk, and improve customer experience.

 

MIDDLE EAST BUSINESS COMMENT & ANALYSIS

date:Posted: December 13, 2018
UAE. Analysts to share expert advice on how to plan for the Digital Future at Gartner Symposium/ITxpo, March 4-6 2019 in Dubai, United Arab Emirates.
date:Posted: December 13, 2018
UAE. Data scientists are brought in by businesses to find solutions to their problems but both sides need to be prepared for failures and hidden opportunities along the way.
date:Posted: December 12, 2018
UAE. Latest ESRA detected incumbent email security systems are leaving organizations vulnerable.
dhgate