The Internet of Things (IoT) is exploding into the mainstream, even as the broader role of mobile applications in the enterprise expands. But concerns about mobile and IoT security are emerging even more rapidly.

The challenge, in a nutshell, is that there are currently no clear lines of responsibility when it comes to IoT and mobile security. Applications are developed and pushed out into the marketplace by their vendors with little or no attention given to security. These apps then pour into organizations that often fail to manage them, and indeed are largely unsure of what apps are being used in their workplaces.

In short, the problems with mobile and IoT security are likely to get worse before they get better.

Who’s in Charge?

A recent study by the Ponemon Institute, IBM Security and Arxan revealed the scope of the challenge and the related difficulties that enterprises are experiencing. According to Infosec Island, “confusion of who owns security within the development, testing and implementation process remains in question.”

A majority of organizations (53 percent) reported concern about being breached via mobile devices, while a slightly larger majority (58 percent) said they worry about being compromised through IoT apps. Meanwhile, 44 percent of organizations admitted they are taking no protective measures, and 11 percent reported uncertainty about whether they are doing so. Doubt, in this case, is not a confidence builder.

This uncertainty, especially on the mobile side, extends to how many apps are in use within the organization. A full 75 percent of respondents indicated that they are not confident in their awareness of the apps their employees are using. Of these, half, or 37 percent of the total, reported “no confidence” on this subject. Other survey results reinforced a picture of uncertainty and passivity.

Rush to Market Leaves Security in the Dust

If there is little consensus about how to handle these challenges, there is considerable consensus about their causes. More than two-thirds of respondents (69 percent) said that mobile apps are shipped with poor security because development teams are pressured to get them out the door. Three-quarters cited this as the cause of vulnerable IoT applications as well.

Further complicating the security picture is uncertainty about who owns — or should own — IoT and mobile security. Only 5 percent of respondents said they regard the CISO has having primary responsibility for IoT security. Instead, the majority of respondents pointed to either the head of engineering or to lines of business.

Prioritizing IoT Security

The two challenges that stand out are the fragmentation of the mobile and IoT marketplaces, and the pressures that lead app developers to regard security as an afterthought. As a basic principle of good design, security needs to be incorporated from the beginning of development, not bolted on afterwards.

A large, fluid and competitive marketplace is very good at innovating technologies and bringing them to consumers. But IoT security and mobile security are being left by the wayside, producing risks that will only grow until the security community and the marketplace demand action.

Download the Ponemon Institute 2017 State of Mobile and IoT Application Security Study

More from Application Security

PixPirate: The Brazilian financial malware you can’t see

10 min read - Malicious software always aims to stay hidden, making itself invisible so the victims can’t detect it. The constantly mutating PixPirate malware has taken that strategy to a new extreme. PixPirate is a sophisticated financial remote access trojan (RAT) malware that heavily utilizes anti-research techniques. This malware’s infection vector is based on two malicious apps: a downloader and a droppee. Operating together, these two apps communicate with each other to execute the fraud. So far, IBM Trusteer researchers have observed this…

From federation to fabric: IAM’s evolution

15 min read - In the modern day, we’ve come to expect that our various applications can share our identity information with one another. Most of our core systems federate seamlessly and bi-directionally. This means that you can quite easily register and log in to a given service with the user account from another service or even invert that process (technically possible, not always advisable). But what is the next step in our evolution towards greater interoperability between our applications, services and systems?Identity and…

Audio-jacking: Using generative AI to distort live audio transactions

7 min read - The rise of generative AI, including text-to-image, text-to-speech and large language models (LLMs), has significantly changed our work and personal lives. While these advancements offer many benefits, they have also presented new challenges and risks. Specifically, there has been an increase in threat actors who attempt to exploit large language models to create phishing emails and use generative AI, like fake voices, to scam people. We recently published research showcasing how adversaries could hypnotize LLMs to serve nefarious purposes simply…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today