Search
  1. Home
Location
Products Resources Partners Company
Location

How Medical Wearables, Kitchen Appliances and Fitness Equipment are Challenging Security Teams in India

Palo Alto Networks Mumbai Sep 16, 2020 at 11:00 AM

In a Palo Alto Networks study, most technology managers feel they need to take significant steps to meet security challenges posed by the growth in IoT devices

 

Mumbai, India – September 16, 2020 – Medical wearables, kitchen appliances and fitness equipment and other connected devices are regularly connecting to corporate networks, prompting technology leaders to warn that significant action should be taken to protect them from being used to hack into businesses.

 

That’s according to a new survey on practices for securing IoT (the Internet of Things) commissioned by Palo Alto Networks, the global cybersecurity leader. It polled 1,350 IT business decision makers in 14 countries in Asia including India, Europe, the Middle East and North America. 

 

Overwhelmingly, respondents report a rise in the number of IoT devices connecting to their networks over the last year. Among the connected trash cans, light bulbs and hand sanitizers, one red flag emerged: More than half of those who polled said they either need to make a lot of improvements to the way they approach IoT security (43 percent), or that a complete overhaul is needed (36 percent). 

 

In India, businesses surveyed have complete confidence (92%) that they have visibility of all the IoT devices connecting to their organisation’s network. However, two in five (40%) of the largest businesses surveyed (3,000 employees plus) reported that they have not segmented IoT devices onto separate networks -- a fundamental practice for building safe smart networks. It is even more worrisome that only 27 percent reported following best practices of using micro-segmentation to contain IoT devices to their own tightly controlled security zones.

 

“Adoption of digital technologies is being seen on an unprecedented scale and so is the spike in security concerns. We need to bear in mind that cybercriminals are getting smarter, thanks to technological advancements and innovations. They are constantly exploring new avenues of cyberattacks - including through IoT devices - and therefore, more caution needs to be exercised by the organisations as they take a technological leap,” said Anil Bhasin, regional vice president, India & SAARC, Palo Alto Networks. He further added, “As we plan on a wider implementation of the Internet of Things (IoT), there has to be a solid strategy in place to overcome the security challenges that come along.”

 

“Traditional networks are ill-equipped to handle the surge in adoption of IoT devices,” said Tanner Johnson, senior cybersecurity analyst at Omdia. “Device behavior baselines need to be established to allow for new recommended policies to help stop malicious activity. For instance, it would raise a flag if a connected thermostat started transmitting gigabytes of data to an unfamiliar site.”

 

Palo Alto Networks released the survey as part of its ongoing effort to shed light on security threats posed by the surge in deployment of devices connected to the internet. Business Insider Intelligence forecasts there will be more than 41 billion IoT devices by 2027, up from 8 billion last year. 

 

For more information on the [IoT survey] and Palo Alto Networks IoT research efforts, please visit https://www.paloaltonetworks.com/resources/research/connected-enterprise-iot-security-report-2020.

 

Survey Methodology

Palo Alto Networks commissioned technology research firm Vanson Bourne. It polled 1,350 IT business decision makers in 14 countries across Asia, Europe, the Middle East and North America. 

 

About Palo Alto Networks

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world's greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices. Our vision is a world where each day is safer and more secure than the one before. For more information, visit www.paloaltonetworks.com.

 

Palo Alto Networks and the Palo Alto Networks logo are trademarks of Palo Alto Networks, Inc. in the United States and in jurisdictions throughout the world. All other trademarks, trade names, or service marks used or mentioned herein belong to their respective owners.

 

Media Contacts

Candour Communications
Chiranjeeta Borah/ Saloni Singhania
Ph: (Cell) +91 9818661995/ +91 9833395087
Email: chiranjeeta@candour.co.in, saloni@candour.co.in

How Medical Wearables, Kitchen Appliances and Fitness Equipment are Challenging Security Teams in India

Datasheet

Palo Alto Networks Logging Service

Palo Alto Networks® Logging Service introduces a simpler approach, managing valuable security logs while enabling innovative security applications in concert with Palo Alto Networks Application Framework.
January 31, 2018
  • 0
  • 1002

Datasheet

Firewall Feature Overview Datasheet

This datasheet provides a comprehensive overview of the critical PAN-OS features that power all next-generation firewalls from Palo Alto Networks.
June 9, 2014
  • 0
  • 7071

Datasheet

GlobalProtect Datasheet

GlobalProtect extends the protection of the Palo Alto Networks Next-Generation Security Platform to your mobile workforce, no matter where they may go.
January 23, 2020
  • 0
  • 14885

Datasheet

DNS Security Service

Apply predictive analytics to disrupt attacks that use DNS for command and control or data theft
February 12, 2019
  • 0
  • 3548

Datasheet

Integrated URL Filtering Datasheet

URL Filtering with PAN-DB enables safe web access, protecting users from dangerous websites, malware sites, credential-phishing pages and attacks.
February 1, 2017
  • 0
  • 6690

Datasheet

Product Summary Specsheet

Key features, performance capacities and specifications for all Palo Alto Networks firewalls.
February 1, 2017
  • 0
  • 185

Get the latest news, invites to events, and threat alerts

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

black youtube icon black twitter icon black facebook icon black linkedin icon
  • USA (ENGLISH)
  • AUSTRALIA (ENGLISH)
  • BRAZIL (PORTUGUÉS)
  • CANADA (ENGLISH)
  • CHINA (简体中文)
  • FRANCE (FRANÇAIS)
  • GERMANY (DEUTSCH)
  • INDIA (ENGLISH)
  • ITALY (ITALIANO)
  • JAPAN (日本語)
  • KOREA (한국어)
  • LATIN AMERICA (ESPAÑOL)
  • MEXICO (ESPAÑOL)
  • SINGAPORE (ENGLISH)
  • SPAIN (ESPAÑOL)
  • TAIWAN (繁體中文)
  • UK (ENGLISH)

Popular Resources

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Investors
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Popular Links

  • About Us
  • Careers
  • Contact Us
  • Manage Email Preferences
Report a Vulnerability

Copyright © 2023 Palo Alto Networks. All rights reserved