{"id":32998,"date":"2019-12-16T14:31:00","date_gmt":"2019-12-16T14:31:00","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/iot-security-its-biggest-headache\/"},"modified":"2019-12-16T14:31:00","modified_gmt":"2019-12-16T14:31:00","slug":"iot-security-its-biggest-headache","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/iot-security-its-biggest-headache\/","title":{"rendered":"IoT security: IT&#8217;s biggest headache"},"content":{"rendered":"<div class=\"teaser\">\n<p>IoT has emerged from the explosive growth of connected devices in industrial verticals, the consumer arena and enterprise networks. The good news is that it has generated massive amounts of data that can be analyzed and acted on, resulting in operational efficiencies and new, revenue-generating services.<\/p>\n<p>The bad news: It\u2019s a security nightmare.<\/p>\n<aside class=\"fakesidebar\">\n<h4><strong>[ Online training:<\/strong> <a href=\"https:\/\/www.idginsiderpro.com\/article\/3445440\/earn-your-iot-security-certification.html\">Earn your IoT security certification<\/a> ]<\/h4>\n<\/aside>\n<p>Vast IoT networks, transmitting data back to enterprise systems for analysis, have multiple points of weakness. The adoption of connected devices in every business sector is creating arguably the biggest tech-related security challenge ever.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2019\/12\/iot_security_thumb-100824500-medium.jpg\" border=\"0\" alt=\"iot security advice\" width=\"300\" height=\"535\" data-imageid=\"100824500\" data-license=\"IDG\"><small class=\"credit\">IDG<\/small><\/p>\n<p>Log in to Insider Pro or <a href=\"https:\/\/www.idginsiderpro.com\/subscribe\/\">subscribe<\/a> now to read our report on IoT security.&nbsp;<\/p>\n<p>The numbers are mind-boggling. The number of connected devices globally could reach 30 billion by 2021, according IDC.&nbsp; That includes consumer items like watches, thermostats, and washing machines but also sensors on things like railway switches, telecom towers, and medical devices. All of this is in addition to sensors that have existed in manufacturing facilities for years.<\/p>\n<h2><strong>IoT creates the ultimate security problem<\/strong><\/h2>\n<p>IoT has produced the quintessential technology quandary: The value of such networks increases with the number of things that are connected, but so do security problems.<\/p>\n<aside class=\"fakesidebar\">\n<h4><strong>[ Security ebook:<\/strong> <a href=\"https:\/\/www.idginsiderpro.com\/article\/3408337\/guide-to-top-security-certifications.html\">Guide to top security certification<\/a> ]<\/h4>\n<\/aside>\n<p>Because of the widespread adoption of connected devices, all business sectors have to be involved in related security issues, in consumer IoT, in enterprise IoT (EoT) and industrial IoT (IIoT).<\/p>\n<p>One of the first rules of getting started in IoT is, if you are not sure whether your staff has a thorough understanding of the security issues involved, go no further until a full assessment is made.<\/p>\n<h2><strong>What are IoT security problems and solutions?<\/strong><\/h2>\n<p>IoT presents two basic challenges. First, IoT devices and systems represent valuable information and infrastructure: not just about consumer devices but buildings, vehicles, utilities and industrial machines, as well as information about users and their behavior. These are attractive assets for rogue nation-state actors and run-of-the-mill hackers alike. So, the number of potential targets as well as antagonists is virtually limitless, with no geographic boundary.<\/p>\n<aside class=\"fakesidebar\">\n<h4>[ Certifications: <a href=\"https:\/\/www.idginsiderpro.com\/article\/3445440\/earn-your-iot-security-certification.html\">Become a certified IoT business leader<\/a> ]<\/h4>\n<\/aside>\n<p>Secondly, the different types of devices, products, people, protocols, applications and computing systems involved means that there are multiple ways to attack any given network, along with related hacking techniques that can be used.<\/p>\n<p>Fortunately, IoT has also given rise to best practices as enterprises of all stripes tackle the security challenges. So take heart. The challenges are great, but you can be helped by&nbsp; techniques for monitoring and managing endpoint devices, fast patching of system flaws, penetration testing, network gateways using the latest security software, and prioritization of exactly what needs to be secured.<\/p>\n<p><em>To learn about best security practices for IoT, download \u201c<strong>Inside IoT Security: Today\u2019s big enterprise challenge\u201d<\/strong><\/em><\/p>\n<\/div>\n<div class=\"premium\">\n<p>IoT has emerged from the explosive growth of connected devices in industrial verticals, the consumer arena and enterprise networks. The good news is that it has generated massive amounts of data that can be analyzed and acted on, resulting in operational efficiencies and new, revenue-generating services.<\/p>\n<p>The bad news: It\u2019s a security nightmare.<\/p>\n<aside class=\"fakesidebar\">\n<h4><strong>[ Online training:<\/strong> <a href=\"https:\/\/www.idginsiderpro.com\/article\/3445440\/earn-your-iot-security-certification.html\">Earn your IoT security certification<\/a> ]<\/h4>\n<\/aside>\n<p>Vast IoT networks, transmitting data back to enterprise systems for analysis, have multiple points of weakness. The adoption of connected devices in every business sector is creating arguably the biggest tech-related security challenge ever.<\/p>\n<p><img border=\"0\" alt=\"iot security advice\" width=\"300\" height=\"535\" data-imageid=\"100824500\" data-license=\"IDG\" data-original=\"https:\/\/images.idgesg.net\/images\/article\/2019\/12\/iot_security_thumb-100824500-medium.jpg\" class=\"lazy\" loading=\"lazy\"><small class=\"credit\">IDG<\/small><\/p>\n<p>Log in to Insider Pro or <a href=\"https:\/\/www.idginsiderpro.com\/subscribe\/\">subscribe<\/a> now to read our report on IoT security.&nbsp;<\/p>\n<div id=\"196357\" class=\"download-asset asset-type-3 asset-format-2\"><a class=\"download-icon\" href=\"https:\/\/images.idgesg.net\/assets\/2019\/12\/insiderpro_ebook_iot_security_dec19.pdf\" rel=\"nofollow\"><span class=\"ss-icon\">download<\/span><\/a> <\/p>\n<div class=\"download-desc\">Inside IoT security: Why it&#8217;s your biggest threat<\/div>\n<\/div>\n<p>The numbers are mind-boggling. The number of connected devices globally could reach 30 billion by 2021, according IDC.&nbsp; That includes consumer items like watches, thermostats, and washing machines but also sensors on things like railway switches, telecom towers, and medical devices. All of this is in addition to sensors that have existed in manufacturing facilities for years.<\/p>\n<h2><strong>IoT creates the ultimate security problem<\/strong><\/h2>\n<p>IoT has produced the quintessential technology quandary: The value of such networks increases with the number of things that are connected, but so do security problems.<\/p>\n<aside class=\"fakesidebar\">\n<h4><strong>[ Security ebook:<\/strong> <a href=\"https:\/\/www.idginsiderpro.com\/article\/3408337\/guide-to-top-security-certifications.html\">Guide to top security certification<\/a> ]<\/h4>\n<\/aside>\n<p>Because of the widespread adoption of connected devices, all business sectors have to be involved in related security issues, in consumer IoT, in enterprise IoT (EoT) and industrial IoT (IIoT).<\/p>\n<p>One of the first rules of getting started in IoT is, if you are not sure whether your staff has a thorough understanding of the security issues involved, go no further until a full assessment is made.<\/p>\n<h2><strong>What are IoT security problems and solutions?<\/strong><\/h2>\n<p>IoT presents two basic challenges. First, IoT devices and systems represent valuable information and infrastructure: not just about consumer devices but buildings, vehicles, utilities and industrial machines, as well as information about users and their behavior. These are attractive assets for rogue nation-state actors and run-of-the-mill hackers alike. So, the number of potential targets as well as antagonists is virtually limitless, with no geographic boundary.<\/p>\n<aside class=\"fakesidebar\">\n<h4>[ Certifcations: <a href=\"https:\/\/www.idginsiderpro.com\/article\/3445440\/earn-your-iot-security-certification.html\">Become a certified IoT business leader<\/a> ]<\/h4>\n<\/aside>\n<p>Secondly, the different types of devices, products, people, protocols, applications and computing systems involved means that there are multiple ways to attack any given network, along with related hacking techniques that can be used.<\/p>\n<p>Fortunately, IoT has also given rise to best practices as enterprises of all stripes tackle the security challenges. So take heart. The challenges are great, but you can be helped by&nbsp; techniques for monitoring and managing endpoint devices, fast patching of system flaws, penetration testing, network gateways using the latest security software, and prioritization of exactly what needs to be secured.<\/p>\n<p><em>To learn about best security practices for IoT, download \u201c<strong>Inside IoT Security: Today\u2019s big enterprise challenge\u201d<\/strong><\/em><\/p>\n<\/div>\n<p> READ MORE <a href=\"https:\/\/www.idginsiderpro.com\/article\/3490075\/iot-security-why-its-your-biggest-nightmare.html#tk.rss_security\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The internet of things encompasses connected devices on a massive scale, actionable data and innovative business models \u2013 and it also brings unprecedented security challenges. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":32999,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[738],"tags":[376,1309,7780,307],"class_list":["post-32998","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networkworld","tag-internet-of-things","tag-it-leadership","tag-it-strategy","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IoT security: IT&#039;s biggest headache 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/iot-security-its-biggest-headache\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IoT security: IT&#039;s biggest headache 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/iot-security-its-biggest-headache\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-12-16T14:31:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/iot-security-its-biggest-headache.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iot-security-its-biggest-headache\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iot-security-its-biggest-headache\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"IoT security: IT&#8217;s biggest headache\",\"datePublished\":\"2019-12-16T14:31:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iot-security-its-biggest-headache\\\/\"},\"wordCount\":951,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iot-security-its-biggest-headache\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/iot-security-its-biggest-headache.jpg\",\"keywords\":[\"Internet of Things\",\"IT Leadership\",\"IT Strategy\",\"Security\"],\"articleSection\":[\"Networkworld\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iot-security-its-biggest-headache\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iot-security-its-biggest-headache\\\/\",\"name\":\"IoT security: IT's biggest headache 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iot-security-its-biggest-headache\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iot-security-its-biggest-headache\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/iot-security-its-biggest-headache.jpg\",\"datePublished\":\"2019-12-16T14:31:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iot-security-its-biggest-headache\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iot-security-its-biggest-headache\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iot-security-its-biggest-headache\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/iot-security-its-biggest-headache.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/iot-security-its-biggest-headache.jpg\",\"width\":1200,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/iot-security-its-biggest-headache\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet of Things\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/internet-of-things\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"IoT security: IT&#8217;s biggest headache\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IoT security: IT's biggest headache 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/iot-security-its-biggest-headache\/","og_locale":"en_US","og_type":"article","og_title":"IoT security: IT's biggest headache 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/iot-security-its-biggest-headache\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-12-16T14:31:00+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/iot-security-its-biggest-headache.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/iot-security-its-biggest-headache\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/iot-security-its-biggest-headache\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"IoT security: IT&#8217;s biggest headache","datePublished":"2019-12-16T14:31:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/iot-security-its-biggest-headache\/"},"wordCount":951,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/iot-security-its-biggest-headache\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/iot-security-its-biggest-headache.jpg","keywords":["Internet of Things","IT Leadership","IT Strategy","Security"],"articleSection":["Networkworld"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/iot-security-its-biggest-headache\/","url":"https:\/\/www.threatshub.org\/blog\/iot-security-its-biggest-headache\/","name":"IoT security: IT's biggest headache 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/iot-security-its-biggest-headache\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/iot-security-its-biggest-headache\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/iot-security-its-biggest-headache.jpg","datePublished":"2019-12-16T14:31:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/iot-security-its-biggest-headache\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/iot-security-its-biggest-headache\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/iot-security-its-biggest-headache\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/iot-security-its-biggest-headache.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/iot-security-its-biggest-headache.jpg","width":1200,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/iot-security-its-biggest-headache\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Internet of Things","item":"https:\/\/www.threatshub.org\/blog\/tag\/internet-of-things\/"},{"@type":"ListItem","position":3,"name":"IoT security: IT&#8217;s biggest headache"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/32998","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=32998"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/32998\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/32999"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=32998"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=32998"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=32998"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}