top of page

25 billion connected devices: Risks and the comprehensive framework of IoT security for businesses

  • 2 hours ago
  • 4 min read

According to technological forecasts by the Institute of Electrical and Electronics Engineers (IEEE), the number of Internet of Things (IoT) devices is expected to increase by approximately 300%, growing from 8.7 billion in 2020 to over 25 billion devices by 2030. The presence of extensive sensor networks and smart devices grants tremendous operational advantages but simultaneously expands the cyber attack surface exponentially.

In this context, establishing a comprehensive strategy regarding IoT security for businesses is not merely a preventative measure but a foundational architecture required to ensure the survival of the entire IT infrastructure.

Identifying core risks from connected infrastructure

IoT devices are typically manufactured with limited computational capabilities to optimize costs, leading to an inherent lack of built-in security features.

IoT devices are often manufactured with limited computing power.
IoT devices are often manufactured with limited computing power.

A joint research report published in 2021 by Viettel and Kaspersky Labs indicated that vulnerabilities stemming from IoT connections contributed to 16 severe data breaches, affecting approximately 100,000 financial accounts. The brand Peloton also faced a crisis when vulnerabilities in their fitness devices risked exposing sensitive user data regarding age, gender, and health.

According to the Institute for Defense and Business (IDB), threat actors frequently target three critical infrastructure categories to infiltrate corporate networks:

  1. Building Infrastructure: Security cameras, access controls, electricity, and environmental management systems. Compromising these devices can cause severe physical operational disruptions across the facility.

  2. Industrial Infrastructure: Sensors and automated computer-operated machinery on production lines (SCADA/ICS). Security incidents here can paralyze the entire manufacturing process, causing massive financial damages.

  3. Communications Infrastructure: Routers and telecommunications systems. When breached, they serve as a springboard for hackers to steal core business data and intelligence.

6 deep-level IoT security solutions for businesses

To defend systems against the sophistication of modern threats, enterprises cannot rely solely on traditional antivirus software.

6 deep-level IoT security solutions for businesses
6 deep-level IoT security solutions for businesses

True IoT security for businesses requires a multi-layered defense architecture, executed through the following six technical methodologies:

1. Complete visibility and device discovery

The initial and most crucial step is eliminating network blind spots. Organizations must deploy automated scanning tools to map every connected IoT device. The profile of each device must include: manufacturer IDs, serial numbers, hardware/firmware versions, and the specific communication protocols utilized (such as NFC, Bluetooth, LoRA, or GPS). From this inventory, administrators build a risk profile for each device to apply the appropriate security policies.

2. Network segmentation and microsegmentation

IoT devices must never operate on the same network space as servers hosting financial data or core applications.

Không cho phép thiết bị IoT hoạt động trên cùng một không gian mạng với các máy chủ chứa dữ liệu tài chính hoặc ứng dụng cốt lõi
Do not allow IoT devices to operate on the same network space as servers containing financial data or core applications.

Based on the established risk profiles, the network infrastructure must be divided into discrete, policy-driven segments (Network Segmentation). This technique narrows the attack surface; if a security camera is infected with malware, the boundaries of the segmented network contain the threat, preventing lateral movement into critical server environments.

3. Strong authentication and digital certificates

A vast majority of IoT devices ship with highly insecure default passwords. Enterprises must establish strong, unique passwords for each device and manage them through enterprise-grade password managers. For remote administrative portals, enabling Multi-Factor Authentication (MFA) is mandatory. Furthermore, for large-scale systems, IT administrators should utilize Digital Certificates to securely and automatically authenticate the identity of every IoT device during machine-to-machine communication.

4. Data encryption and router security

All data transmitted by IoT devices must be encrypted to prevent eavesdropping and data theft in transit. Additionally, the routers connecting IoT devices must be accurately configured: applying the highest encryption standards, disabling easily exploited connection protocols like UPnP (Universal Plug and Play), and utilizing hidden network names to avoid the attention of scanning cybercriminals.

5. Patch management and intrusion prevention systems (IPS)

Organizations must never assume that IoT software is entirely secure. An active firmware update strategy must be established from the installation phase. However, many legacy devices are no longer supported with vendor patches, or cannot be taken offline for updates. In these scenarios, deploying an Intrusion Prevention System (IPS) is the optimal solution. An IPS provides "virtual patching" capabilities, intercepting vulnerability exploitation attempts without requiring direct intervention into the device’s software.

6. Real-time monitoring and ZTNA / SASE architecture

To manage thousands of devices, businesses must integrate continuous network traffic monitoring tools to establish a baseline of normal device operations. If any anomaly occurs (e.g., a device transmitting data to an unknown IP address), the system instantly generates an alert.

Concurrently, organizations should integrate IoT security with Zero Trust Network Access (ZTNA) and Secure Access Service Edge (SASE) architectures. ZTNA adheres to the principle of least privilege, trusting no device until fully verified. Meanwhile, SASE provides cloud-based tools to automate device scanning, manage Identity Access Management (IAM), and deliver security policies directly to the network edge.

Solving the resource dilemma through expert partnerships

Synchronizing and maintaining all six security layers is a technical challenge that exceeds the capabilities of many enterprises, particularly when there is a shortage of in-house cybersecurity experts.

Partnering with professional managed security service providers, such as the ecosystem from IPSIP Vietnam, is a practical strategy for effective risk management. Through the 24/7 SOC (Security Operations Center) and robust Firewall systems, organizations can instantly establish traffic analysis, network segmentation, and malicious connection interception. Support from Vulnerability Scan and IT Support services also assists businesses in maintaining the discipline of detecting outdated devices and configuring encryption, ensuring data integrity without inflating the technical workforce.

Operating an Internet of Things network delivers a breakthrough in productivity, but only a comprehensive strategy regarding IoT security for businesses can firmly protect those achievements. Adopting Zero Trust architectures, network segmentation, and maintaining active monitoring systems are the foundations for organizations to confidently step into the connected era.

--------------

References:

  • Article: "How to secure IoT devices in business" - NordLayer.

  • Article: "What is IoT Security? Definition and Challenges of IoT Security" - Fortinet.

  • Document: "Cybersecurity and the Internet of Things (IoT)" - Institute for Defense and Business (IDB).

  • Security Report on IoT data breaches - Kaspersky Labs & Viettel (2021).

Comments


IPSIP logo transparent.png

IPSIP VIETNAM ONE MEMBER LIMITED LIABILITY COMPANY (IPSIP VIETNAM OMLLC)

Tax code: 0313859600

🏢 SH05.01, B4 Street, Saritown Area, An Khanh Ward, Ho Chi Minh City, Vietnam

​☎  +84 918 397 489

  • Linkedin
  • Facebook
  • TikTok
  • Email liên hệ

Our Services

Sign up to receive in-depth cybersecurity documents and news from IPSIP Vietnam.

bottom of page