Typically, organizations proactively protect their laptops while other devices go unmonitored and without protections.
Modern-day organizations are challenged with handling diverse types of devices accessing their data. These devices are not only tough to manage, but accumulatively, they generate a massive attack surface. In the same breath, the health and trustworthiness of those devices also greatly impact organizations’ security postures.
According to Gartner, “With IoT deployments, there remains a fundamental issue for many organizations to better assess the risk brought by unauthorized and unsecured devices. Organizations need to better understand and assess the existence and impact of IoT devices connecting to their infrastructures, and the potential vulnerabilities these devices may present. Therefore, organizations need to reach out outside their traditional IT infrastructure boundaries to find better ways to mitigate risks coming from the: