Industry NewsHIGH

New Device Categories - Rising Risks in Enterprise Networks

HNHelp Net Security·Reporting by Sinisa Markovic
Summary by CyberPings Editorial·AI-assisted·Reviewed by Rohit Rana
Updated:
🎯

Basically, new devices in networks make it easier for hackers to attack companies.

Quick Summary

Forescout's latest research reveals new device categories are increasing enterprise risk. Financial services and government sectors are particularly vulnerable, facing significant security challenges. Understanding and addressing these risks is crucial for protecting sensitive data and systems.

What Happened

In a significant shift, Forescout's 2026 Riskiest Devices research reveals that enterprise networks are increasingly vulnerable due to the addition of new device categories. This year, 11 new riskiest asset types have entered the rankings, marking the second-largest year-over-year increase on record. Among these, serial-to-IP converters and workstations have quickly ascended to the top five riskiest IT assets, underscoring the growing complexity of securing modern enterprise environments.

The research highlights how the attack surface is expanding across various domains, including IT, IoT, OT, and IoMT. As organizations integrate more connected devices, they inadvertently create more opportunities for threat actors to exploit vulnerabilities.

Who's Affected

The findings indicate that financial services and government sectors are particularly at risk. Financial services have the highest average device risk, more than three times that of retail. Government institutions follow closely, with their risk levels more than double those of the manufacturing sector. This disparity emphasizes the urgent need for these industries to enhance their security measures.

Organizations are challenged by the presence of embedded firmware and special operating systems that complicate inventory and patch management. As these sectors lead in device risk, they must prioritize security strategies that address vulnerabilities across all connected environments.

What Data Was Exposed

The report reveals that the top five riskiest IT assets include routers, serial-to-IP converters, workstations, firewalls, and domain controllers. Notably, routers are identified as the highest-risk category, averaging 32 vulnerabilities per device. In the IoT realm, devices such as VoIP systems and network video recorders are also flagged as high-risk.

In the realm of IoMT, healthcare-related devices like medication dispensing systems and MRI scanners lead the risk rankings. The 2026 list now encompasses 20 different device types, spanning the four domains, which indicates a growing concern for organizations that rely on a diverse array of connected devices.

What You Should Do

Organizations must adopt a holistic security approach that encompasses all device types across IT, IoT, and OT environments. Focusing security efforts on a single domain is no longer sufficient, as attackers are increasingly exploiting weaknesses across multiple environments.

To mitigate risks, enterprises should:

  • Conduct regular inventory assessments to identify all connected devices.
  • Implement automated patch management to ensure devices are up-to-date.
  • Train staff on recognizing potential threats and vulnerabilities.
  • Collaborate across departments to enhance visibility and response capabilities.

By taking these proactive measures, organizations can better safeguard their networks against the evolving landscape of cyber threats.

🔒 Pro insight: The surge in new device categories highlights the urgent need for comprehensive security strategies that span multiple environments to mitigate evolving threats.

Original article from

HNHelp Net Security· Sinisa Markovic
Read Full Article

Also covered by

ITIT Security Guru

Routers Replace PCs as Primary Threat Vector in Evolving Device Risk Landscape

Read Article

Related Pings

LOWIndustry News

Anjali Hansen - Emphasizes Cross-Team Collaboration in Privacy

Anjali Hansen shares her career journey and the vital role of cross-team collaboration in cybersecurity. Her insights highlight how teamwork strengthens data protection efforts across organizations.

CyberWire Daily·
LOWIndustry News

Jurassic Fish Chokes on Squid - A 150-Million-Year-Old Fossil

A 150-million-year-old fish fossil reveals it choked on a squid-like creature. This discovery highlights ancient marine life interactions and extinction events. Explore its significance today.

Schneier on Security·
MEDIUMIndustry News

Business Resilience - 6 Metrics IT Leaders Must Track

IT leaders must track six crucial metrics for business resilience. These metrics help manage risks and maintain operational continuity amid rising threats. Understanding and implementing these can safeguard your organization.

CSO Online·
MEDIUMIndustry News

Alcatraz Secures $50 Million for AI-Powered Security Solutions

Alcatraz has raised $50 million to enhance its AI-driven security systems. This funding will support its expansion into critical infrastructure markets. The investment addresses privacy concerns while improving access control.

SC Media·
MEDIUMIndustry News

Protecting Enterprise Value During Mergers and Acquisitions

Mergers and acquisitions can threaten enterprise value. Discover five strategies to protect it during these transitions. Safeguarding value is crucial for long-term success.

Proofpoint Threat Insight·
MEDIUMIndustry News

Internet Bug Bounty Program - Payouts Temporarily Paused

The Internet Bug Bounty program has paused all payouts for bug submissions. This affects researchers in open-source software, as AI changes how vulnerabilities are discovered. The shift raises concerns about the future of open-source security. Stay tuned for updates from HackerOne.

CSO Online·