Close Menu
geekfence.comgeekfence.com
    What's Hot

    Open Cosmos launches first satellites for new LEO constellation

    January 25, 2026

    Achieving superior intent extraction through decomposition

    January 25, 2026

    How UX Research Reveals Hidden AI Orchestration Failures

    January 25, 2026
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    Facebook Instagram
    geekfence.comgeekfence.com
    • Home
    • UK Tech News
    • AI
    • Big Data
    • Cyber Security
      • Cloud Computing
      • iOS Development
    • IoT
    • Mobile
    • Software
      • Software Development
      • Software Engineering
    • Technology
      • Green Technology
      • Nanotechnology
    • Telecom
    geekfence.comgeekfence.com
    Home»IoT»Securing enterprise IoT, OT, and mobile systems
    IoT

    Securing enterprise IoT, OT, and mobile systems

    AdminBy AdminNovember 6, 2025No Comments5 Mins Read1 Views
    Facebook Twitter Pinterest LinkedIn Telegram Tumblr Email
    Securing enterprise IoT, OT, and mobile systems
    Share
    Facebook Twitter LinkedIn Pinterest Email


    For enterprise leaders, the integration of mobile, IoT, and Operational Technology (OT) systems has become a double-edged sword. While these technologies form the backbone of business operations and drive innovation, they have also created a vast, interconnected, and vulnerable new attack surface.

    A new report from Zscaler ThreatLabz, analysing over 500 trillion daily signals and 20 million mobile-related threats, concludes that threat actors are successfully exploiting this “expanding web of connectivity and interdependence”.

    IoT and OT as prime targets

    For COOs and CISOs in asset-heavy industries, the report’s IoT and OT findings are sobering. Malicious activity is now a high-volume reality.

    The attack landscape is dominated by a few persistent malware families – Mirai, Mozi, and Gafgyt – which together account for roughly 75 percent of all malicious IoT payloads. Their primary targets are the gateways to the network. Routers remain the most targeted device type, accounting for over 75 percent of all attacks, as attackers exploit them for “botnet expansion and malware delivery”.

    This focus on network hardware has a direct impact on the industrial sector. The manufacturing and transportation sectors are tied for the most-targeted industries, each accounting for 20.2 percent of all IoT malware attacks.

    While these traditional OT sectors remain high-priority targets, the threat is spreading. The report documents explosive year-over-year growth in attacks against sectors adopting enterprise IoT systems, including:

    • Arts, Media & Entertainment (1,862% increase)
    • Education (861% increase)
    • Finance & Insurance (702% increase)
    • Energy, Utilities, and Oil & Gas (459% increase)

    Making matters worse is the growing reliance on cellular-connected IoT. These devices, often deployed in remote or rugged environments, create a “shadow attack surface that is difficult to detect and defend” due to connectivity gaps and weak SIM protections.

    The entry point: mobile devices and hybrid work

    Beyond enterprise IoT and OT systems, threat actors are well aware that the easiest path into a secure operational environment is often through the corporate network, and the easiest path onto that network is via an employee’s mobile device.

    The report notes a 67 percent year-over-year growth in Android malware transactions. This is directly linked to the realities of modern work. As hybrid models become permanent, “employees are splitting their time between home and office, often leaning heavily on their mobile devices for communication, productivity, and access to corporate resources”.

    The widespread adoption of Bring Your Own Device (BYOD) policies, while flexible, expands the attack surface. As the report states, employee-owned devices “are often used to access sensitive corporate data, connect to enterprise networks, and utilise productivity applications, creating potential vulnerabilities”.

    Attackers are targeting these devices through several key vectors. A primary method is infiltrating trusted marketplaces; the ‘Tools’ category on the Google Play Store is a frequent disguise for malware, with one report noting 239 malicious apps were downloaded 42 million times.

    This is often paired with social engineering, such as “mishing” (SMS-based phishing), which uses urgent fake delivery or bank warnings to lure users to malicious sites.

    Finally, the goal is often to gain control through permission abuse. Many malware families – like the Xnotice RAT – are designed to trick users into granting accessibility service permissions, which is described as “the most common way threat actors gain full control of infected devices”.

    The industries targeted by mobile malware mirror those targeted on the OT front. Manufacturing (26.06%) and Energy, Utilities, Oil, & Gas (18.97%) are the top two sectors hit by mobile threats.

    The surge in attacks against the Energy sector (up 387% year-over-year) and Healthcare (up 225%) shows a deliberate effort to compromise employees in organisations that manage essential infrastructure and sensitive data.

    Strategies for securing enterprise IoT, mobile, and OT systems

    The convergence of IoT, mobile, and OT threats requires a corresponding convergence in defence. The report’s findings champion a move away from perimeter-based security toward a zero-trust architecture.

    For enterprise leaders, this translates into three immediate priorities:

    1. Discover and classify: The first step is complete visibility. Organisations must develop “a unified strategy to achieve complete visibility into your IoT and OT ecosystem, including the discovery and inventory of all devices—managed, unmanaged, and ‘shadow’ systems”. Without a full inventory, secure segmentation is impossible.
    1. Focus on network segmentation: The core principle of zero-trust is to assume a breach and prevent lateral movement. The report urges leaders to “implement advanced zero-trust network segmentation” and “isolate unmanaged OT systems into ‘networks of one’”. This ensures that even if a device is compromised, it cannot be used as a stepping stone to reach essential operational controls.
    1. Secure cellular connections: The “shadow attack surface” of cellular IoT must be brought into the light. This involves enhancing “security for cellular IoT devices” by securing SIM cards to “prevent unauthorised access to internal applications or abuse of unlimited data plans”.

    Securing this interdependent ecosystem of IoT, mobile, and OT enterprise systems is no longer just a task for the CISO. It is a core business resilience issue that demands the attention of the full executive team.

    See also: Samsung boosts manufacturing with digital twins, AI, and robotics

    Banner for IoT Tech Expo by TechEx events.

    Want to learn more about IoT from industry leaders? Check out IoT Tech Expo taking place in Amsterdam, California, and London. The comprehensive event is part of TechEx and is co-located with other leading technology events including the Cyber Security Expo. Click here for more information.

    IoT News is powered by TechForge Media. Explore other upcoming enterprise technology events and webinars here.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    How Content Management Is Transforming Construction ERP

    January 25, 2026

    Diabolic Parasite Is a Neat New Wi-Fi-Enabled Keystroke Injector and Keylogger

    January 24, 2026

    Join Cisco at the Rocky Mountain Cyberspace Symposium to unlock new possibilities for intelligent networks!

    January 23, 2026

    Deploying Small Language Models at Scale with AWS IoT Greengrass and Strands Agents

    January 22, 2026

    Mastering Cyber Resilience Act Compliance: A Practical Guide for IoT Success

    January 21, 2026

    Sunsets of mobile networks demand managing legacy IoT risks

    January 20, 2026
    Top Posts

    Understanding U-Net Architecture in Deep Learning

    November 25, 202511 Views

    Hard-braking events as indicators of road segment crash risk

    January 14, 20269 Views

    Microsoft 365 Copilot now enables you to build apps and workflows

    October 29, 20258 Views
    Don't Miss

    Open Cosmos launches first satellites for new LEO constellation

    January 25, 2026

    Press Release Open Cosmos, the company building satellites to understand and connect the world, has…

    Achieving superior intent extraction through decomposition

    January 25, 2026

    How UX Research Reveals Hidden AI Orchestration Failures

    January 25, 2026

    ByteDance steps up its push into enterprise cloud services

    January 25, 2026
    Stay In Touch
    • Facebook
    • Instagram
    About Us

    At GeekFence, we are a team of tech-enthusiasts, industry watchers and content creators who believe that technology isn’t just about gadgets—it’s about how innovation transforms our lives, work and society. We’ve come together to build a place where readers, thinkers and industry insiders can converge to explore what’s next in tech.

    Our Picks

    Open Cosmos launches first satellites for new LEO constellation

    January 25, 2026

    Achieving superior intent extraction through decomposition

    January 25, 2026

    Subscribe to Updates

    Please enable JavaScript in your browser to complete this form.
    Loading
    • About Us
    • Contact Us
    • Disclaimer
    • Privacy Policy
    • Terms and Conditions
    © 2026 Geekfence.All Rigt Reserved.

    Type above and press Enter to search. Press Esc to cancel.