Forescout’s latest report reveals a sharp rise in vulnerabilities across Internet of Things (IoT) devices, marking a 136% increase compared to the previous year. Drawing insights from an extensive dataset of nearly 19 million devices, the study underscores the pressing security challenges posed by IoT infrastructure. Key findings indicate that the proportion of vulnerable IoT devices surged from 14% in 2023 to a concerning 33% in 2024, with wireless access points, routers, printers, VoIP systems, and IP cameras identified as the most susceptible device types.
Rik Ferguson, Forescout’s VP of Security Intelligence, highlights that threat actors primarily target IoT devices integrated into enterprise networks, such as IP cameras and building management systems, as prime entry points for clandestine activities. With IoT endpoints often operating beyond the purview of traditional security stacks, they represent lucrative targets for attackers seeking to infiltrate organizational networks undetected. Addressing vulnerabilities within IoT ecosystems has thus become imperative to fortifying digital defenses and mitigating potential breaches.
The report emphasizes the urgency for robust security measures to mitigate the risks associated with IoT vulnerabilities. Given the significant increase in vulnerabilities observed across a wide range of IoT device types, organizations must prioritize comprehensive security strategies to protect against potential exploitation by malicious actors. As IoT devices continue to proliferate across industries, enhancing security protocols and implementing proactive measures are critical to safeguarding digital infrastructure and mitigating the evolving threat landscape.
In addition to highlighting vulnerabilities within IoT ecosystems, the report underscores the importance of industry-wide collaboration and information sharing to address emerging cybersecurity challenges. By fostering greater awareness and understanding of IoT security risks, organizations can better prepare and respond to evolving threats, ultimately strengthening the resilience of interconnected systems and ensuring the integrity of digital infrastructure.