• CA
  • magnifying glass search icon to open search field
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
Palo Alto Networks logo
  • Products
  • Solutions
  • Services
  • Partners
  • Company
  • More
  • CA
    Language
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
  • Unit 42 Threat Intelligence

Lights, Cameras…Vulnerabilities? Rise of Non-Business IoT Devices Putting North American Corporate Networks At Risk

Palo Alto Networks TORONTO Oct 20, 2021 at 12:01 PM

IoT survey from Palo Alto Networks highlights the need for shared responsibility among remote workers and IT teams to secure their enterprise

TORONTO, Oct. 20, 2021 /CNW/ -- Cyber adversaries know that one small IoT sensor can provide entry into a corporate network to launch ransomware attacks and more. According to a survey of IT decision-makers by Palo Alto Networks (NYSE: PANW), 84% of respondents in North America (among those whose organization has IoT devices connected to its network) reported an increase in non-business IoT devices on corporate networks in the last year. Smart lightbulbs, heart rate monitors, connected gym equipment, coffee machines, game consoles and even pet feeders are among the list of the strangest devices identified on such networks in the study.

For the second year, survey responses warn of needed security changes to protect corporate networks from non-business IoT devices. This year, 96% of the same group above indicated their organization's approach to IoT security needs improvement, and 1 in 4 (25%) said it needs a complete overhaul with the greatest capability needs around threat protection (59%), risk assessment (55%), and IoT device context for security teams (55%).

"IoT adoption has become a critical business enabler. It presents new security challenges that can only be met if employees and employers share responsibility for protecting networks," said Ivan Orsanic, regional vice president and country manager, Canada at Palo Alto Networks. "Remote workers need to be aware of devices at home that may connect to corporate networks via their home router. Enterprises need to better monitor threats and access to networks and create a level of segmentation to safeguard remote employees and the organization's most valuable assets."

Worth noting, of the 400 North American IT decision-makers polled by Palo Alto Networks this year that have IoT devices connected to their network, half (50%) indicated that IoT devices are segmented on a separate network from the one they use for primary business devices and business applications (e.g. HR system, email server, finance system, etc.), and another 29% of respondents said that IoT devices are microsegmented within security zones — an industry best practice where organizations create tightly controlled security zones on their networks to isolate IoT devices and keep them separate from IT devices to avoid hackers from moving laterally on a network.

Top 3 IoT Security Tips for the Work-from-Home (WFH) Employee

  1. Get more familiar with your router. All of your connected devices likely connect to the internet through your router. Start by changing defaults — the settings every router comes with — to something unique. Then encrypt your network by simply updating your router settings to either WPA3 Personal or WPA2 Personal. 
  2. Keep track of which devices are connected. You can access your router's web interface and look for "connected devices," "wireless clients" or "DHCP clients" to see a list and disconnect older devices you no longer use, and disable remote management on the devices where you don't need it.
  3. Segment the home network. Network segmentation is not only for large corporations. You can segment your home network by creating a guest Wi-Fi network. The easiest way to do this is to have IoT devices use a guest Wi-Fi network, while other devices use the main network. This helps to logically group devices in your home and isolate them from each other. Keeping them on a separate network makes it difficult to get to your computers from a compromised IoT device. 

Top 3 IoT Security Tips for the Enterprise

  1. Know the unknowns. Get complete visibility into all IoT devices connected to the enterprise. An effective IoT security solution should be able to discover the exact number of devices connected to your network, including the ones you are and are not aware of — and those forgotten. This discovery helps collect an up-to-date inventory of all IoT assets. 
  2. Conduct continuous monitoring and analysis. Implement a real-time monitoring solution that continuously analyzes the behaviour of all your network-connected IoT devices to contextually segment your network between your IT and IoT devices — and their workloads. Securing and managing WFH setups as branch extensions of the enterprise requires a new approach.
  3. Automate risk-based security policy recommendations and enforcement. An IoT security solution should be easy to deploy without the need for any additional infrastructure or investment. Look for a solution that leverages your existing firewall investment for comprehensive and integrated security posturing. Running in conjunction with the capabilities of your firewall, the solution should automatically recommend and natively enforce security policies based on the level of risk and the extent of untrusted behaviour detected in your IoT devices. An IoT security strategy should also align with the principle of Zero Trust to enforce policies for least-privileged access control. Additionally, a point solution can extend a corporate network and bring unified security policy management and SASE (secure access service edge) to WFH employees. 

Palo Alto Networks helps secure IoT devices with IoT Security, which combines machine learning with patented App-ID™ technology to provide the most accurate and deepest level of visibility into your IoT and OT devices for effective baselining of their normal behaviors. The solution empowers security teams to proactively prevent threats, monitor device risk, detect anomalies, and recommend then apply policies for enforcement.

For more information: 

  • To read The Connected Enterprise: IoT Security Report 2021, please visit this page. 
  • To learn more about Palo Alto Networks IoT Security, please visit this page. 

Survey Methodology 
Palo Alto Networks commissioned technology research firm Vanson Bourne, which polled 1,900 IT decision-makers at organizations in 18 countries: United States, Canada, Brazil, United Kingdom, France, Germany, Netherlands, Middle East (comprising of UAE and Saudi Arabia), Spain, Italy, Ireland, Australia, China (including Hong Kong), India, Japan, Singapore and Taiwan.

About Palo Alto Networks 
Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world's greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices. Our vision is a world where each day is safer and more secure than the one before. For more information, visit www.paloaltonetworks.com. 

Palo Alto Networks, App-ID and the Palo Alto Networks logo are trademarks of Palo Alto Networks, Inc. in the United States and in jurisdictions throughout the world. All other trademarks, trade names, or service marks used or mentioned herein belong to their respective owners.

About Vanson Bourne
Vanson Bourne is an independent specialist in market research for the technology sector. Their reputation for robust and credible research-based analysis is founded upon rigorous research principles and their ability to seek the opinions of senior decision makers across technical and business functions, in all business sectors and all major markets. For more information, visit www.vansonbourne.com.


Datasheet

Product Summary Specsheet

Key features, performance capacities and specifications for all Palo Alto Networks firewalls.

February 1, 2017
  • 3579

Datasheet

PA-220 Specsheet

Palo Alto Networks PA-220 brings next-generation firewall capabilities to distributed enterprise branch offices, retail locations and midsized businesses.

January 12, 2017
  • 7299

Datasheet

PA-800 Series Specsheet

Palo Alto Networks PA-800 Series next-generation firewall appliances, comprising the PA-820 and PA-850, are designed to secure enterprise branch offices and midsized businesses.

February 1, 2017
  • 5230

Datasheet

PA-3200 Series

Palo Alto Networks® PA-3200 Series of next-generation firewalls comprises the PA-3260, PA-3250 and PA-3220, all of which are targeted at high-speed internet gateway deployments.

February 20, 2018
  • 7171

Datasheet

PA-3000 Series Specsheet

Key features, performance capacities and specifications of the Palo Alto Networks PA-3000 Series.

February 1, 2017
  • 5450

White Paper

11 Things to Focus on to be PCI Compliant in AWS

This ebook will explore some practical tips and guidance that we’ve collected from our security and compliance experts who have built and managed PCI-compliant environments in AWS.

August 27, 2019
  • 793

Get the latest news, invites to events, and threat alerts

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

Products and Services

  • AI-Powered Network Security Platform
  • Secure AI by Design
  • Prisma AIRS
  • AI Access Security
  • Cloud Delivered Security Services
  • Advanced Threat Prevention
  • Advanced URL Filtering
  • Advanced WildFire
  • Advanced DNS Security
  • Enterprise Data Loss Prevention
  • Enterprise IoT Security
  • Medical IoT Security
  • Industrial OT Security
  • SaaS Security
  • Next-Generation Firewalls
  • Hardware Firewalls
  • Software Firewalls
  • Strata Cloud Manager
  • SD-WAN for NGFW
  • PAN-OS
  • Panorama
  • Secure Access Service Edge
  • Prisma SASE
  • Application Acceleration
  • Autonomous Digital Experience Management
  • Enterprise DLP
  • Prisma Access
  • Prisma Access Browser
  • Prisma SD-WAN
  • Remote Browser Isolation
  • SaaS Security
  • AI-Driven Security Operations Platform
  • Cloud Security
  • Cortex Cloud
  • Application Security
  • Cloud Posture Security
  • Cloud Runtime Security
  • Prisma Cloud
  • AI-Driven SOC
  • Cortex XSIAM
  • Cortex XDR
  • Cortex XSOAR
  • Cortex Xpanse
  • Unit 42 Managed Detection & Response
  • Managed XSIAM
  • Threat Intel and Incident Response Services
  • Proactive Assessments
  • Incident Response
  • Transform Your Security Strategy
  • Discover Threat Intelligence

Company

  • About Us
  • Careers
  • Contact Us
  • Corporate Responsibility
  • Customers
  • Investor Relations
  • Location
  • Newsroom

Popular Links

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Manage Email Preferences
  • Products A-Z
  • Product Certifications
  • Report a Vulnerability
  • Sitemap
  • Tech Docs
  • Unit 42
  • Do Not Sell or Share My Personal Information
PAN logo
  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Copyright © 2025 Palo Alto Networks. All Rights Reserved

  • Youtube
  • Podcast
  • Facebook
  • LinkedIn
  • Twitter
  • Select your language