Share

Mobile Security and IoT: Growing Risks for Critical Infrastructure. Verizon Report

Verizon Business' 2024 Mobile Security Index highlights organizations' growing dependence on mobile devices and IoT, but also how this technology exposes new vulnerabilities, especially in critical infrastructure.

Mobile Security and IoT: Growing Risks for Critical Infrastructure. Verizon Report

We live in a world increasingly connected, where the use of smartphones for work purposes has become common, and the Internet of Things (IoT) is taking on increasing importance. Mobile Security Index 2024 di Verizon Business, highlights how the mobile devices andIoT are now indispensabili for most of the organizations: 80% of companies consider mobile devices crucial for daily activities, while 95% rely on IoT for process management. This growing technological dependence, however, also exposes companies to new vulnerabilities, particularly in the critical infrastructure sector, such as energy and telecommunications, where 96% of operators use IoT, but over 50% have suffered security incidents resulting in data loss or operational disruption.

Il Verizon Report, now in its seventh edition, based on a panel of 600 corporate security managers, highlights the main threats to mobile and IoT device security. In addition to examining employee mobile device usage, it also analyzes the growing diffusion of IoT sensors and tools, addressing related security issues, especially in a global context marked by the increase in remote working.

Cyber ​​Threats Rise with Artificial Intelligence

Another alarming fact from the report concerns theevolution of cyber threats, especially those that exploit artificial intelligence. 77% of respondents believe that AI-enhanced attacks, such as deepfakes and SMS phishing, are highly likely to succeed. These attacks are difficult to detect, as they often use advanced manipulation and deception techniques that can compromise the security of even the most robust systems.

Despite the increasing sophistication of attacks, AI plays a crucial role also in defense solutions. 88% of critical infrastructure respondents recognize that AI is essential to improving defenses against advanced threats. AI can be used to detect anomalies in data flows, identify intrusion attempts, and automate responses to security incidents.

The Impact of IoT on Enterprise Networks

The increase inuse of IoT devices has profoundly transformed corporate networks. Companies no longer just manage phones and laptops, but must protect a wide range of sensors and systems designed to monitor, measure and control critical business activities. The Industrial Internet of Things (IIoT) is accelerating this change, expanding the scope and complexity of networks.

T.J. Fox, Senior Vice President of Industrial IoT and Automotive at Verizon Business, emphasizes how the growing adoption of IIoT requires a greater commitment in terms of technical knowledge and IT solutions. Businesses must be able to secure increasingly sophisticated and interconnected networks, where IoT plays a key role. “Today, our customers are increasingly dependent on IoT devices as a critical element of their networks. The inclusion of IoT in their tech ecosystem makes its protection imperative,” said Fox.

Increasing Defense for Critical Infrastructure

Cybersecurity is now a top priority for organizations in any industry, particularly for those operating in critical infrastructure. The Mobile Security Index 2024 highlights how 84% of organizations have increased its spending on mobile security over the past year, and 89% of critical infrastructure operators expect further increases in the near future.

To protect their mobile and IoT devices from evolving threats, organizations must adopt comprehensive and robust security plans. Second Phil Hochmuth, Vice President of Enterprise Mobility Research at IDC, a strategic approach involves moving from a personal device-based model to one based on centrally managed business equipment. “This paradigm shift allows for greater control over devices, reducing the risk of cyber attacks that could compromise critical infrastructure,” said Hochmuth.

Best practices to mitigate risks

The 2024 report offers several practical recommendations to help businesses protect themselves from cyber threats. One of the key strategies suggested is the adoption of advanced security frameworks such as Zero Trust and the NIST Cybersecurity Framework 2.0These models involve a security approach based on the assumption that no user or device should be trusted by default.

Furthermore, companies must comply with regulations, such as NIS Directive2 of the European Union, which imposes high standards for the protection of critical infrastructure. Continuous training for employees, rapid incident response plans and advanced threat detection capabilities are additional crucial elements of an effective defense strategy.

comments