Checklist for IoT Security Audits

Though still in their infancy, IoT security audits can be a useful tool in managing the security challenges that may arise from the use of unmanaged connected devices such as printers, security cameras, conference room tablets and remote property sensors. These devices, rife with risk, now comprise 30 percent of business’ network endpoints. This checklist, which stems from our in-depth article on how to address enterprise IoT risks, can serve a guide to use when conducting an IoT audit. See “How to Address Intensifying Enterprise IoT Security Risks” (Oct. 14, 2020).

To read the full article

Continue reading your article with a CSLR subscription.