Is the threat always external?
Unfortunately, no. With more and more confidential data moving through organizations, and an expanding ecosystem of Internet-connected infrastructure, people, processes and devices, there come additional attack paths for would-be hackers. Organizations then pivot, adopting more effective strategies to defeat malware.
These security flaws may be used as their initial gateway. Once a hacker has established a foothold in a networked device, they can move laterally throughout the organization to gather further data. The IoT brings with it many positives, including flexibility, mobility, and expedience. But if you think it presents a greater threat than benefit to your organizational security, now is the time to assess the risks associated with your connected office environment and act.