As Internet of Things (IoT) based cyber-attacks continue to intensify in frequency and severity, the IoT security spending trend also continues to escalate, with worldwide spending expected to reach $1.5 billion in 2018.

That’s according to the latest Gartner Survey. The firm also found that nearly one-fifth of all organizations surveyed have observed at least one IoT based cyber-attack in the last three years.

This 28% increase in spending from 2017 is only expected to rise; experts believe spending will reach $3.1 billion in 2021. While worldwide spending is currently on the rise, Gartner predicts that through 2020, the biggest inhibitor to growth for IoT security will come from a lack of prioritization and implementation of security best practices, hampering the potential spending on IoT security by 80%.

The lack of technical standards for specific IoT components contributes significantly to the IoT security threat. Additionally, the absence of security-by-design comes from a lack of specific and stringent regulations.

But organizations have been working tirelessly to develop IoT endpoint best practices to help simplify IoT security. The Industrial Internet Consortium recently released its Endpoint Security Best Practices whitepaper which highlights endpoint protection and how countermeasures or controls, through risk modeling and threat analysis, can be applied to achieve a particular security level (basic, enhanced or critical). This guidance uses key information about endpoint device security from leading industrial guidance and compliance frameworks, such as NIST 800-53 and NIST 800-171.

Gartner expects this trend to change moving forward, especially within highly regulated industries such as healthcare energy. In fact, by 2021, Gartner predicts that regulatory compliance will become the primary driver behind IoT security uptake. Industries required to comply with regulations aimed at improving critical infrastructure protection are now obligated to focus on security as a result of IoT saturating the industrial world.


Read the article on InfoSecurity Magazine


The Most Powerful & Reliable Cybersecurity Products

change tracker gen7r2 logo

Change Tracker Gen 7R2: Complete configuration and system integrity assurance combined with the most comprehensive and intelligent change control solution available.

FAST Cloud logo

Fast Cloud: Leverage the world’s largest whitelist repository to automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology)

vulnerability tracker logo

Vulnerability Tracker: The world’s only limitless and unrestricted vulnerability scanning solution with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.

log tracker logo

Log Tracker: Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds

Contact Us

Corporate Headquarters

6160 Warren Parkway, Suite 100
Frisco, Texas, 75034

Phone 1: 1-949-407-5125

Phone 2: 888-638-9749 (toll-free)

[email protected]

United Kingdom

5 New Street Square
London EC4A 3TW

Phone: +44 (0) 203 588 3023

 [email protected]
SC Magazine Cybersecurity 500 CSGEA Winners 2021 CIS benchmarking SEWP Now Certified IBM Security
Copyright 2023, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.