Skip to main content
Microsoft Security
Sensors, software and growing technology make up the ever-expanding network of the internet of things (IoT)

The unique security risk of IoT/OT devices

What’s the difference between IoT and OT?

The Internet of Things (IoT) is a reference to a growing network of physical objects (“things”) that possess the sensors, software, and other technologies necessary to connect and exchange data with other devices on the internet. These devices can be medical equipment, embedded systems, sensors, printers, or any smart household or handheld device.

On the other hand, operational technology (OT) defines a specific category of hardware and software that were designed to monitor and control performance for physical processes, devices, and infrastructure. In essence, OT is hardware or software that can operate independent of internet connectivity. Examples of these kinds of devices could be industrial machinery, robotic arms, turbines, centrifuges, air conditioning systems, and more.

The convergence between the IT world’s laptops, web applications, and hybrid workspaces, and the OT world’s factory and facility-bound control systems bring significant risks. Through greater connectivity, attackers can now “jump” air gaps between formerly physically isolated systems.

Similarly, IoT devices like cameras and smart conference rooms can become risk catalysts by creating novel entryways into workspaces and other IT systems.

In terms of impact, threat actors infiltrating an IT network can mean gaining access to critical OT. The implications of this are wide-reaching, from hefty financial losses for the organization and the theft of foundational IP, to onsite safety concerns where uncontrolled operational technology can affect human lives.

Attacks against remote management devices are on the rise

The Microsoft Threat Intelligence Center (MSTIC) observed a variety of IoT/OT attack types through its sensor network. The most prevalent attacks were against remote monitoring and management devices, attacks via the web, and attacks on databases (brute forcing or exploits).

If not secured correctly, an exposed IoT device can be used as a pivot point into another layer of the enterprise network as unauthorized users can remotely access the ports.

Learn more about Iot/OT threats and get guidance

Growing IoT and the risk to OT

Prevent 98% of cyberattacks against IoT and OT devices. Learn how cybersecurity hygiene can be used to protect against ransomware and cyber extortion.

Learn more

Using cybersecurity to help manage volatility in the global threat landscape

As cyber threats evolve, it can be tough to prioritize the right steps to take to keep your organization safe. To remain proactive in your cybersecurity efforts, follow these essential steps to help stay ahead of potential threats.

Learn more

CISO Insider Issue 1

Navigate today’s threat landscape with exclusive analysis and recommendations from security leaders.

Learn more