Non-business devices might be your company's biggest security risk

security
(Image credit: Shutterstock)

With the prevalence of remote working, the biggest threat to corporate networks comes from non-business Internet of Things (IoT) devices, according to a new report.

A study by Palo Alto Networks reveals that seven out of ten IT decision-makers in the UK (68%) whose organization allows IoT devices to connect to its network, found that the lax cybersecurity practices in IoT devices poses the biggest threat to business networks.

The figure rises to 78% after collating data from organizations around the world, including businesses in the biggest economies in Asia, Europe, North America, and South America, and Australia.

TechRadar needs you!

We're looking at how our readers use VPNs with streaming sites like Netflix so we can improve our content and offer better advice. This survey won't take more than 60 seconds of your time, and we'd hugely appreciate if you'd share your experiences with us.

>> Click here to start the survey in a new window <<

“When you consider that the security controls in consumer IoT devices are minimal, so as not to increase the price, the lack of visibility coupled with increased remote working could lead to serious cybersecurity incidents,” notes Greg Day, VP and CSO EMEA, Palo Alto Networks.

Time for a new policy

In response to the type of IoT incident that keeps IT leaders up at night, 55% voted Industrial  IoT attacks to the top of the list, closely followed by distributed denial of services (DDoS) attacks (50%).

The survey found that the greatest security capability needs were around protection against threats (61%) such as malware and ransomware, risk assessment (50%) and segmentation (50%).

While the vast majority (93%) of the respondents indicated that their organization’s approach to IoT security needs improvement, respondents in the UK were far less likely than their EMEA counterparts to feel that drastic change was needed, with only 4% believing a complete overhaul was needed compared to the EMEA average of 20%. 

Joint responsibility

On a positive note though, of the 1,900 global respondents, more than four in ten (44%) in the UK, and over half (51%) globally indicated that IoT devices are segmented on a separate network from the one they use for primary business devices and business applications.

Based on their reading of the data, Palo Alto argues that an effective strategy to safeguard business networks from rogue IoT devices can only emerge from a joint responsibility by both business and employees.

"Remote workers need to be aware of devices at home that may connect to corporate networks via their home router. Enterprises need to better monitor threats and access to networks and create a level of segmentation to safeguard remote employees and the organization's most valuable assets,” believes Ryan Olson, vice president of threat intelligence, Unit 42 at Palo Alto Networks.

Mayank Sharma

With almost two decades of writing and reporting on Linux, Mayank Sharma would like everyone to think he’s TechRadar Pro’s expert on the topic. Of course, he’s just as interested in other computing topics, particularly cybersecurity, cloud, containers, and coding.

Read more
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
IoT’s botnet problem is up 500% – three things admins must do now
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Hardware supply chain threats can undermine your endpoint infrastructure
Cyber-security
Many firms see cyberattacks as their top business concern this year
Abstract image of cyber security in action.
Network complexity: a hidden tax on business
Abstract image of cyber security in action.
TikTok’s American ownership rule ignores bigger IoT threat
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Sounding the alarm on AI-powered cybersecurity threats in 2025
Latest in Security
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
This top WordPress plugin could be hiding a worrying security flaw, so be on your guard
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Veeam urges users to patch security issues which could allow backup hacks
UK Prime Minister Sir Kier Starmer
The UK releases timeline for migration to post-quantum cryptography
Representational image depecting cybersecurity protection
Cisco smart licensing system sees critical security flaws exploited
Latest in News
Ray-Ban Meta Smart Glasses
Samsung's rumored smart specs may be launching before the end of 2025
Apple iPhone 16 Review
The latest iPhone 18 leak hints at a major chipset upgrade for all four models
Quordle on a smartphone held in a hand
Quordle hints and answers for Monday, March 24 (game #1155)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Monday, March 24 (game #386)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Monday, March 24 (game #652)
Quordle on a smartphone held in a hand
Quordle hints and answers for Sunday, March 23 (game #1154)