Nine Security Threats Posed By Connected Devices

Network Breaches Are Difficult To Detect

It's virtually impossible to know whether or not a network has been compromised or breached, Potter said.

"It's not if, but when," Potter said.

In order to have any chance of spotting an attack, Potter said companies must know what autonomous devices are supposed to be doing after they're added to the network. That way, they will be able to spot irregular data or abnormal activity.

Additionally, Potter said devices must be scoped, configured and deployed properly, with the design taking into account where the device will be used and the keys and certificates tied to the product lifecycle.