Information Security

Defending the digital infrastructure

IoT cybersecurity: Do third parties leave you exposed?

IoT's vast vendor landscape drives innovation, but working with so many third parties also comes with baggage in the form of third-party cybersecurity issues.

In some ways, security is all about perspective. It wasn't that long ago that BYOD felt like a daunting challenge for information security and risk management professionals. But, now, a couple hundred smartphones and iPads can seem like child's play compared to IoT cybersecurity, which involves protecting everything from connected cars to networked sensors to smart locks and control systems.

Part of what makes IoT cybersecurity so complex is its reliance on a vast ecosystem of third-party providers. While many of these companies aspire to deliver a unified approach to security, the reality is that it can be incredibly challenging for enterprise IT teams to get different devices, platforms and systems to play nicely together.

A May 2019 report by Ponemon Institute revealed that, even among IoT-savvy organizations, corporate risk management pros are largely aware of third-party cybersecurity vulnerabilities but still have a ways to go in mitigating such IoT cybersecurity gaps.

Article 3 of 6
This was first published in August 2019

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

What steps do you think are most vital in assessing third-party security risks?
Cancel

Get More Information Security

Access to all of our back issues View All

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close