• AU
  • magnifying glass search icon to open search field
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
Palo Alto Networks logo
  • Products
  • Solutions
  • Services
  • Partners
  • Company
  • More
  • AU
    Language
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
  • Unit 42 Threat Intelligence

Connected Heart Monitors, Teddy Bears, Kettles, and Coffee Makers are Posing New Challenges to Security Teams as IoT Device Usage Increases

Palo Alto Networks SYDNEY Sep 17, 2020 at 11:00 AM

New Palo Alto Networks study finds that most technology managers feel they need to take significant steps to meet security challenges posed by the surge in IoT devices

 

SYDNEY, Australia, September 17, 2020 – Palo Alto Networks (NYSE: PANW), the global cybersecurity leader, today released research on practices for securing the Internet of Things (IoT) in businesses across the Asia-Pacific region, including Australia. 

The research suggests that smart teddy bears, implanted heart monitors, electric cars, and other connected devices are regularly connecting to corporate networks. This has prompted technology managers to warn that significant action should be taken to protect them from being used to hack into businesses.

Key Findings in Australia:

  • Most respondents (94 per cent) say they have visibility of all the IoT devices connecting to their organisation’s network
    • 52 per cent said they were completely confident
    • 42 per cent noted that they were somewhat confident
  • Majority of respondents say their organisation needs to improve the approach to IoT security
    • 11 per cent said a complete overhaul was needed
    • 45 per cent sought a lot of improvement
    • 41 per cent see a need for a little improvement
  • More than half of respondents saw an increase in the number of connected devices on their organisation’s network
    • More than 1 in 3 saw a significant increase
  • Top three strangest connected devices respondents have seen on their network
    • 51 per cent saw medical wearables such as heart or diabetes monitors
    • 40 per cent saw desk toys such as teddy bears, and robots
    • 39 per cent saw kitchen appliances such as kettles, coffee machines, and heated coffee cups

“When it comes to IoT devices, we need to take a zero-trust approach, which should be at the heart of every company’s IoT connected strategy. That means defining the purpose of every device and object linked to a network and setting boundaries, so it only connects to parts of the network that help it serve that purpose," said Sean Duca, Vice President and Regional Chief Security Officer for Asia Pacific and Japan, Palo Alto Networks.

 

Across the Asia-Pacific region, nearly one in four of those surveyed at organisations with at least 1,000 employees reported that they have not segmented IoT devices onto separate networks – a fundamental practice for building secure smart networks. Similarly, only 21 per cent said following best practices of using micro-segmentation to contain IoT devices to their own tightly controlled security zones.

 

“Employees are innocently bringing devices onto their organisation’s network without realising that often, those are not designed and built with security in mind which could be a cybercriminal’s inroad to compromising your systems. Businesses need to realise that an IoT security strategy is just as important as any other growth plan as the risks are often as costly if not more so,” Sean added. 

 

Palo Alto Networks released the survey as part of its ongoing effort to shed light on security threats posed by the surge in deployment of devices connected to the internet. Business Insider Intelligence forecasts there will be more than 41 billion IoT devices by 2027, up from 8 billion last year.
 

Survey Methodology
Palo Alto Networks commissioned technology research firm Vanson Bourne. It polled 1,350 IT business decision makers in 14 countries across Asia, Europe, the Middle East and North America.

 

About Palo Alto Networks
Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organisations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world's greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organisations across clouds, networks, and mobile devices. Our vision is a world where each day is safer and more secure than the one before. For more information, visit www.paloaltonetworks.com.


Datasheet

PA-5200 Series Specsheet

Palo Alto Networks® PA-5200 Series of next-generation firewall appliances comprises the PA-5260, the PA-5250 and the PA-5220, which target high-speed data center, internet gateway and service provider deployments. The PA-5200 Series delivers up to 72 Gbps of throughput using dedicated processing and memory for the key functional areas of networking, security, threat prevention and management.

February 1, 2017
  • 5291

Datasheet

Cortex XDR

Hunt down and stop stealthy attacks by unifying network, endpoint, and cloud data

May 6, 2020
  • 16293

Datasheet

Panorama Datasheet

Overview of Panorama, our centralized security management system, that provides you with global control over multiple Palo Alto Networks firewalls.

March 18, 2019
  • 2495

Datasheet

IoT Security Solution Brief

The industry's only complete IoT security product with visibility, prevention and enforcement for every IoT and OT device. Securing your investments in IoT and eliminating risk.

July 8, 2020
  • 15802

Customer Case Study

University of Adelaide

The University of Adelaide is one of Australia’s Group of Eight research-intensive universities and is consistently ranked among the top one percent of universities in the world. Established in 1874, the University of Adelaide is Australia’s third oldest university and an iconic Adelaide institution.

April 7, 2014
  • 805

Datasheet

Prisma Access (GlobalProtect Cloud Service) Datasheet

Global expansion, mobile workforces and cloud computing are shifting the locations of your applications, data and users. These changes introduce new opportunities for business efficiencies, but they also create a set of unique cybersecurity challenges.

January 8, 2020
  • 798

Get the latest news, invites to events, and threat alerts

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

Products and Services

  • AI-Powered Network Security Platform
  • Secure AI by Design
  • Prisma AIRS
  • AI Access Security
  • Cloud Delivered Security Services
  • Advanced Threat Prevention
  • Advanced URL Filtering
  • Advanced WildFire
  • Advanced DNS Security
  • Enterprise Data Loss Prevention
  • Enterprise IoT Security
  • Medical IoT Security
  • Industrial OT Security
  • SaaS Security
  • Next-Generation Firewalls
  • Hardware Firewalls
  • Software Firewalls
  • Strata Cloud Manager
  • SD-WAN for NGFW
  • PAN-OS
  • Panorama
  • Secure Access Service Edge
  • Prisma SASE
  • Application Acceleration
  • Autonomous Digital Experience Management
  • Enterprise DLP
  • Prisma Access
  • Prisma Access Browser
  • Prisma SD-WAN
  • Remote Browser Isolation
  • SaaS Security
  • AI-Driven Security Operations Platform
  • Cloud Security
  • Cortex Cloud
  • Application Security
  • Cloud Posture Security
  • Cloud Runtime Security
  • Prisma Cloud
  • AI-Driven SOC
  • Cortex XSIAM
  • Cortex XDR
  • Cortex XSOAR
  • Cortex Xpanse
  • Unit 42 Managed Detection & Response
  • Managed XSIAM
  • Threat Intel and Incident Response Services
  • Proactive Assessments
  • Incident Response
  • Transform Your Security Strategy
  • Discover Threat Intelligence

Company

  • About Us
  • Careers
  • Contact Us
  • Corporate Responsibility
  • Customers
  • Investor Relations
  • Location
  • Newsroom

Popular Links

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Manage Email Preferences
  • Products A-Z
  • Product Certifications
  • Report a Vulnerability
  • Sitemap
  • Tech Docs
  • Unit 42
  • Do Not Sell or Share My Personal Information
PAN logo
  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Copyright © 2025 Palo Alto Networks. All Rights Reserved

  • Youtube
  • Podcast
  • Facebook
  • LinkedIn
  • Twitter
  • Select your language