jul-aug20_2

EMERGENT Within the enterprise space, Zscaler identified as many as 80 different types of devices from 39 manufacturers. Those devices included digital sig- nage media players, IP cameras and phones, digital video recorders, printers and networking devices. Within the manufacturing and retail segment, which generates the most traffic across Zscaler’s net- works, analysis identified 57 different devices from 20 manufacturers. These include geolocators, 3D printers, industrial control devices, data collection terminals, automotive multimedia systems and payment terminals. Within entertainment and homes, incidentally, Zscaler counted 420 devices from 150 unique manufacturers. The Secure Play For MSPs leaning toward security expertise, includ- ing the emerging crop of MSSPs (managed service security provides), opportunities with business IoT are particularly ripe. Considering the nature of a widely dispersed network connecting a growing number of varying endpoints, it’s no surprise that IoT devices have become an increasingly common attack point, as well as a chief concern among CIO types considering and deploying IoT-based solutions. On the Zscaler network, for instance, the company was blocking about 2,000 pieces of IoT malware per month as recently as May 2019. That number has increased to more than 14,000 today, a seven-fold increase. With the new emphasis on work from home and hybrid work accommodations, things only get more complicated. “As enterprises have mobility and always-on connectivity, the lines have blurred between company owned and privately owned devices, and between the workplace and the home,” said the Zscaler report. “In many cases, enterprise IT teams might not even be aware of some of the devices generating IoT traffic, and this new culture of shadow IoT is creating new IoT-based attack vectors for cybercriminals.” Analysis by Zscaler’s found significant enterprise IoT traffic generated by unauthorized IoT devices such as digital home assistants, TV set-top boxes, IP cam- eras, smart home devices, smart TVs, smart watches, and even automotive multimedia systems. “What this tells us is that employees inside the office might be checking their nanny cam over the corporate network,” said Zscaler. “Or using their Apple Watch to look at email. Or working from home, connected to the enterprise network, and periodi- cally checking the home security system or access- ing media devices.” The top authorized devices on business IoT net- works include data collection terminals, payment Source: Zscaler Top 5 Cyberattacks C Victims of in 2019 Source: Untangle IT Channel Reaso Source: CompTIA Phishing Attack #1 (Tied) Malware/Virus #1 (Tied) Ransomware #3 Cryptojacking #4 DDoS #5 Tools have evolved tha custome Improve custom Competitiv Boost profits/d Younger clients h Customer pr sales/support h Customers have Zscaler IoT Traffic Volume by Vertical Traffic Volume Per Verticals 56.8% 15.7% 23.7% 3.8% Enterprise Healthcare Manufacturing and Retail Entertainment and Home Automation MSPs Top Reported Challenges to Running Managed IoT Practice Source: CompTIA Overcoming connectivity issu s Cost/overhead Managing rapid growth of data Learning cur e of new technology St ying on top of security concerns Hiring people with the right loT skills Keeping loT hardware updat 54% 51% 46% 46% 45% 40% 39% Source: Zscaler Zscaler IoT Traffic Volume by Vertical Traffic Volume Per Verticals 56.8% 15.7% 23.7% 3.8% Enterprise Healthcare Manufacturing and Retail Entertainment and Home Automation % 1% 1% 1% 1% MSPs Top Reported Challenges to Running Managed IoT Practice Source: CompTIA Overcoming connectivity issues Cost/overhead Managing rapid growth of data Learning curve of new technology Staying on top of security concerns Hiring people with the right loT skills Keeping loT hardware updated 54% 51% 46% 46% 45% 40% 39% 12 CHANNEL VISION | July - August, 2020

RkJQdWJsaXNoZXIy NTg4Njc=