As new IoT security reports reveal staggering data points, it is becoming essential that the IoT community bands together to improve upon the security of IoT devices. Palo Alto Networks’ global threat intelligence team, Unit 42, recently published its 2020 Unit 42 IoT Threat Report. This report analyzed 1.2 million IoT devices to evaluate the full scope of the current IoT threat landscape, discovering that 98 percent of all IoT device traffic is unencrypted and 57 percent of IoT devices are vulnerable to medium or high-severity attacks. While these numbers may seem unnerving, there remains potential for proper widespread IoT security strategy and implementation.
At first glance, IoT security may seem daunting, however, it is possible to properly secure devices with the right protocols and cybersecurity measures in place. Any IoT security solution must be wholistic in its approach, and company IoT deployments must plan to implement security measures across multiple layers that include hardware, network and software security. Open Connectivity Foundation’s focus on the software application layer is a crucial first step in the IoT design process.