IoT devices deployed throughout the enterprise represent 30% of all endpoints, and are the easiest penetration point to the enterprise network. IoT devices are used as an entry point to launch undetectable supply chain and insider threat attacks.
2022 saw a 62% surge in supply chain attacks, spanning software, firmware and 3rd party. 61% of companies have suffered an insider attack in the past 12 months. Since IoT devices lack endpoint protection, they are an effective initial access point for attackers looking to gain entry into an organization and then move laterally across its network.
Once an IoT device has been compromised, the attacker can transition from an IoT device into the main IT network and execute pivot attacks on the organizations crown jewels.