{"id":87914,"date":"2024-05-29T07:06:14","date_gmt":"2024-05-29T14:06:14","guid":{"rendered":"https:\/\/forescoutstage.wpengine.com\/research-labs\/better-safe-than-sorry-copy\/"},"modified":"2024-09-27T21:14:29","modified_gmt":"2024-09-28T04:14:29","slug":"riskiest-devices","status":"publish","type":"page","link":"https:\/\/www.forescout.com\/research-labs\/riskiest-devices\/","title":{"rendered":"Riskiest Connected Devices 2024"},"content":{"rendered":"<h1>Riskiest ConnectedDevices in 2024<\/h1>\n<p>This year marks Forescout Research \u2013 Vedere Labs\u2019 fourth annual report on risky devices. We analyzed device data in Forescout\u2019s Device Cloud between January 1 and April 30. Device Cloud is one of the world\u2019s largest repositories of connected enterprise devices and includes IT, OT, IoT and IoMT data. The anonymized data is collected from our customer deployments and contains information from nearly 19 million devices in every industry across the globe \u2013 and grows monthly.<\/p>\n<p>\u00a0<\/p>\n<p>Watch Webinar Read Report <\/p>\n<p>\u00a0<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/devices.png\" class=\"c-stats__img\" style=\"width:100px;height:auto\" loading=\"lazy\"><\/p>\n<h3 class=\"c-stats__numbers\">\n19M<\/h3>\n<p class=\"c-stats__text\">devices<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/operating-system.png\" class=\"c-stats__img\" style=\"width:100px;height:auto\" loading=\"lazy\"><\/p>\n<h3 class=\"c-stats__numbers\">\n2500<\/h3>\n<p class=\"c-stats__text\">special-purpose  operating systems<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/increase.png\" class=\"c-stats__img\" style=\"width:100px;height:auto\" loading=\"lazy\"><\/p>\n<h3 class=\"c-stats__numbers\">\n136%<\/h3>\n<p class=\"c-stats__text\">YoY increase  in IoT vulnerabilities<\/p>\n<figure class=\"video-player\">\n<\/figure>\n<h2 class=\"c-title \">Explore Today\u2019s Most Vulnerable Devices<\/h2>\n<p>Join this webinar led by Daniel dos Santos, Head of Security Research, as we reveal our latest research findings on the most critical IT, IoT, OT and IoMT devices discovered within enterprise networks in 2024. Gain exclusive insights into the inherent risks and unlock actionable strategies to effectively mitigate these risks within your organization.<\/p>\n<p><a href=\"\/webinars\/2024-riskiest-devices-ams\/\" title=\"Watch Now\" class=\"c-btn c-btn--white c-btn--outline has-icon icon-camera icon-position-right has-icon-animation icon-animation-fade-in\">Watch Now<\/a><\/p>\n<h2 class=\"c-title\">Riskiest Device Categories<\/h2>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/Riskiest-Devices-2024-Cateogries.png\" class=\"element-visibility has-element-animation element-animation-fade-in\" loading=\"lazy\"><\/p>\n<h2 class=\"c-title \">\n<h3>Most Vulnerable Device Types<\/h3>\n<\/h2>\n<p>Network devices overtake endpoints as the riskiest in 2024 led by wireless access points and routers. <\/p>\n<p><a href=\"\/blog\/what-are-the-riskiest-connected-devices-right-now\/\" title=\"Read Blog\" class=\"c-btn c-btn--white has-icon icon-arrow-right icon-position-right has-icon-animation icon-animation-fade-in\">Read Blog<\/a><\/p>\n<h2 class=\"c-title \">\n<h3>Most Vulnerable Device Categories<\/h3>\n<\/h2>\n<p>IT dominates riskiest device categories followed by IoT.<br \/>\nIn 2024, the Internet of Medical Things takes over Operational Technology devices.\n\n<h2 class=\"c-title \">\n<h3>Open Ports by Industry<\/h3>\n<\/h2>\n<ul class=\"c-list--primary c-list--triangle\" style=\"text-align: left\">\n<li>Telnet: Healthcare (4%), technology (3%) and manufacturing (3%)<\/li>\n<li>SSH: Entertainment (52%), technology (39%) and oil and gas (33%)<\/li>\n<li>RDP: Services (14%), oil and gas (12%) and manufacturing (12%)<\/li>\n<li>SMB: Technology (37%), financial (32%) and services (30%)<\/li>\n<\/ul>\n<p><a href=\"\/resources\/2024-riskiest-connected-devices\/\" title=\"Access Report\" class=\"c-btn c-btn--primary c-btn--outline has-icon icon-duotone-triangles-down icon-position-right has-icon-animation icon-animation-fade-in\" target=\"_blank\" rel=\"noopener\">Access Report<\/a><\/p>\n<p><a href=\"\/resources\/better-safe-than-sorry-proactively-identifying-at-risk-internet-exposed-otics\/\" class=\"u-display-inline-block u-line-height-0\"><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/06\/FS-24-Risk-Score-Methodology-v7.png\" class=\"u-size-full\" loading=\"lazy\"><\/a><\/p>\n<h2 class=\"c-title \">\n<h3>Risk Scoring Methodology<\/h3>\n<\/h2>\n<p>To measure risk, we use Forescout\u2019s multifactor risk scoring methodology which is calculated based on three factors: Configuration, behavior and function. <\/p>\n<ul class=\"c-list--primary c-list--triangle\" style=\"text-align: left\">\n<li>Configuration is the number and severity of vulnerabilities on a device, plus the quantity and criticality of open ports. <\/li>\n<li>Behavior tracks inbound and outbound malicious traffic to devices and inbound internet traffic towards the devices<\/li>\n<li>Function is the potential impact to the organization if a device is compromised. <\/li>\n<\/ul>\n<p>Each device is assigned a risk score between one and 10. After measuring the risk of each individual device, we calculate averages per type of device to understand which types are the riskiest.<\/p>\n<p><a href=\"\/resources\/multifactor-risk-scoring\/\" title=\"Learn More\" class=\"c-btn c-btn--secondary has-icon icon-duotone-triangles-down icon-position-right has-icon-animation icon-animation-fade-in\" target=\"_blank\" rel=\"noopener\">Learn More<\/a><\/p>\n<h2 class=\"c-title\">Riskiest Devices Global Heat Map<\/h2>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/06\/riskiest-devices-heatmap.png\" loading=\"lazy\"><\/p>\n<p><a href=\"\/webinars\/2024-riskiest-devices-ams\/\" title=\"Watch Webinar\" class=\"c-btn c-btn--secondary c-btn--outline has-icon icon-camera icon-position-right has-icon-animation icon-animation-fade-in\">Watch Webinar<\/a><\/p>\n<h3>Countries With the Highest Average Device Risk<\/h3>\n<h3>Legacy Windows by Industry<\/h3>\n<p><a href=\"\/resources\/2024-riskiest-connected-devices\/\" title=\"Access Report\" target=\"_blank\" rel=\"noopener\"><\/p>\n<h2>Riskiest Device Categories 2023 to 2024<\/h2>\n<ul class=\"c-list--primary c-list--triangle\" style=\"text-align: left\">\n<li>IoT increases by 136% year over year<\/li>\n<li>IT drops from 78% to 58%<\/li>\n<li>Vulnerabilities in network devices expand beyond endpoints <\/li>\n<li>Wireless access points and routers total 54% of device-type vulnerabilities<\/li>\n<\/ul>\n<p><\/a><\/p>\n<h3 class=\"u-mt\">2023<\/h3>\n<h3 class=\"u-mt\">2024<\/h3>\n<p><a href=\"\/resources\/2024-riskiest-connected-devices\/\" class=\"u-display-inline-block u-line-height-0\"><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/06\/riskiest-devices-LGTHM.png\" class=\"u-size-full\" loading=\"lazy\"><\/a><\/p>\n<h2 class=\"c-title \">Dive Into the Research <\/h2>\n<p>Our research takes a fresh look at this year\u2019s riskiest devices. Read the full report to see other findings, such as:<br \/>\n\u00a0\n<ul class=\"c-list--primary c-list--triangle\" style=\"text-align: left\">\n<li>Nine brand new device types that make our list including five in the Internet of Medical Things category.<\/li>\n<li>A highly detailed breakdown of the riskiest devices across all categories in: IT, IoT, OT and IoMT.<\/li>\n<li>Why specific device solutions cannot effectively reduce risk because they are blind to other parts of the network being used in attacks.<\/li>\n<\/ul>\n<p><a href=\"\/resources\/2024-riskiest-connected-devices\/\" title=\"Read Report\" class=\"c-btn c-btn--primary c-btn--outline has-icon icon-duotone-triangles-down icon-position-right has-icon-animation icon-animation-fade-in\" target=\"_blank\" rel=\"noopener\">Read Report<\/a><\/p>\n<h2 class=\"c-title\">Strategic Recommendations:How Forescout Can Help<\/h2>\n<ul class=\"c-list--primary c-list--triangle\" style=\"text-align: left\">\n<li><strong>Risk and exposure management:<\/strong> Identify, quantify and prioritize cybersecurity risk. Start by <a href=\"\/solutions\/asset-inventory\/\">discovering and assessing every connected asset<\/a> to gain real-time awareness of your attack surface.<\/li>\n<li><strong>Network security:<\/strong> Continuously monitor all connected assets to <a href=\"\/solutions\/network-access-control\/\">govern network access<\/a>, using real-time traffic visibility to manage segmentation and dynamic control policies to mitigate and remediate risk.<\/li>\n<li><strong>Threat detection and response:<\/strong> <a href=\"\/products\/threat-detection-and-response-xdr\/\">Detect, investigate and respond<\/a> to true threats and incidents using threat detection and response capabilities to collect telemetry and logs, correlate attack signals, generate high-fidelity detections and enable automated responses.<\/li>\n<\/ul>\n<p><a href=\"\/demo\/\" title=\"schedule demo\" class=\"c-btn c-btn--white c-btn--outline has-icon icon-demo icon-position-right has-icon-animation icon-animation-pulse\">schedule demo<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Riskiest ConnectedDevices in 2024 This year marks Forescout Research \u2013 Vedere Labs\u2019 fourth annual report on risky devices. We analyzed device data in Forescout\u2019s Device Cloud between January 1 and April 30. Device Cloud is one of the world\u2019s largest repositories of connected enterprise devices and includes IT, OT, IoT and IoMT data. The anonymized [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":70336,"menu_order":60,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":"","_links_to":"","_links_to_target":""},"coauthors":[407],"class_list":["post-87914","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Riskiest Connected Devices 2024 - Forescout Research<\/title>\n<meta name=\"description\" content=\"Forescout\u2019s 2024 Riskiest Connected Devices research report audits cybersecurity risk of IT, OT, IoT, IoMT assets in 10 industry verticals.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forescout.com\/research-labs\/riskiest-devices\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Riskiest Connected Devices 2024 - Forescout Research\" \/>\n<meta property=\"og:description\" content=\"Forescout\u2019s 2024 Riskiest Connected Devices research report audits cybersecurity risk of IT, OT, IoT, IoMT assets in 10 industry verticals.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forescout.com\/research-labs\/riskiest-devices\/\" \/>\n<meta property=\"og:site_name\" content=\"Forescout\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForescoutTechnologies\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-28T04:14:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/devices.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@Forescout\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forescout.com\/research-labs\/riskiest-devices\/\",\"url\":\"https:\/\/www.forescout.com\/research-labs\/riskiest-devices\/\",\"name\":\"Riskiest Connected Devices 2024 - Forescout Research\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/research-labs\/riskiest-devices\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/research-labs\/riskiest-devices\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/devices.png\",\"datePublished\":\"2024-05-29T14:06:14+00:00\",\"dateModified\":\"2024-09-28T04:14:29+00:00\",\"description\":\"Forescout\u2019s 2024 Riskiest Connected Devices research report audits cybersecurity risk of IT, OT, IoT, IoMT assets in 10 industry verticals.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forescout.com\/research-labs\/riskiest-devices\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forescout.com\/research-labs\/riskiest-devices\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/research-labs\/riskiest-devices\/#primaryimage\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/devices.png\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/devices.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forescout.com\/research-labs\/riskiest-devices\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forescout.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vedere Labs\",\"item\":\"https:\/\/www.forescout.com\/research-labs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Riskiest Connected Devices 2024\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forescout.com\/#website\",\"url\":\"https:\/\/www.forescout.com\/\",\"name\":\"Forescout\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forescout.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forescout.com\/#organization\",\"name\":\"Forescout Technologies, Inc.\",\"url\":\"https:\/\/www.forescout.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Forescout Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ForescoutTechnologies\",\"https:\/\/x.com\/Forescout\",\"https:\/\/www.instagram.com\/forescouttechnologies\/\",\"https:\/\/www.linkedin.com\/company\/forescout-technologies\",\"https:\/\/www.youtube.com\/user\/forescout1\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Riskiest Connected Devices 2024 - Forescout Research","description":"Forescout\u2019s 2024 Riskiest Connected Devices research report audits cybersecurity risk of IT, OT, IoT, IoMT assets in 10 industry verticals.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forescout.com\/research-labs\/riskiest-devices\/","og_locale":"en_US","og_type":"article","og_title":"Riskiest Connected Devices 2024 - Forescout Research","og_description":"Forescout\u2019s 2024 Riskiest Connected Devices research report audits cybersecurity risk of IT, OT, IoT, IoMT assets in 10 industry verticals.","og_url":"https:\/\/www.forescout.com\/research-labs\/riskiest-devices\/","og_site_name":"Forescout","article_publisher":"https:\/\/www.facebook.com\/ForescoutTechnologies","article_modified_time":"2024-09-28T04:14:29+00:00","og_image":[{"url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/devices.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@Forescout","twitter_misc":{"Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.forescout.com\/research-labs\/riskiest-devices\/","url":"https:\/\/www.forescout.com\/research-labs\/riskiest-devices\/","name":"Riskiest Connected Devices 2024 - Forescout Research","isPartOf":{"@id":"https:\/\/www.forescout.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.forescout.com\/research-labs\/riskiest-devices\/#primaryimage"},"image":{"@id":"https:\/\/www.forescout.com\/research-labs\/riskiest-devices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/devices.png","datePublished":"2024-05-29T14:06:14+00:00","dateModified":"2024-09-28T04:14:29+00:00","description":"Forescout\u2019s 2024 Riskiest Connected Devices research report audits cybersecurity risk of IT, OT, IoT, IoMT assets in 10 industry verticals.","breadcrumb":{"@id":"https:\/\/www.forescout.com\/research-labs\/riskiest-devices\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forescout.com\/research-labs\/riskiest-devices\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/research-labs\/riskiest-devices\/#primaryimage","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/devices.png","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/devices.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.forescout.com\/research-labs\/riskiest-devices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forescout.com\/"},{"@type":"ListItem","position":2,"name":"Vedere Labs","item":"https:\/\/www.forescout.com\/research-labs\/"},{"@type":"ListItem","position":3,"name":"Riskiest Connected Devices 2024"}]},{"@type":"WebSite","@id":"https:\/\/www.forescout.com\/#website","url":"https:\/\/www.forescout.com\/","name":"Forescout","description":"","publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forescout.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forescout.com\/#organization","name":"Forescout Technologies, Inc.","url":"https:\/\/www.forescout.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","width":1,"height":1,"caption":"Forescout Technologies, Inc."},"image":{"@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForescoutTechnologies","https:\/\/x.com\/Forescout","https:\/\/www.instagram.com\/forescouttechnologies\/","https:\/\/www.linkedin.com\/company\/forescout-technologies","https:\/\/www.youtube.com\/user\/forescout1"]}]}},"featured_media_url":false,"is_file":false,"excerpt_manually_set":false,"_links":{"self":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/87914","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/comments?post=87914"}],"version-history":[{"count":0,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/87914\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/70336"}],"wp:attachment":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media?parent=87914"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/coauthors?post=87914"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}