Zscaler Blog

Get the latest Zscaler blog updates in your inbox

Security Research

Mobile, IoT, and OT Risks Converge in the Public Sector

HEATHER BATES, ADAM FORD
November 06, 2025 - 5 min read

Connected technology is central to how governments, healthcare providers, and schools operate today. We see it all around us: public safety cameras across cities, medical devices in hospitals, and digital learning tools used in classrooms every day. But with this dependence comes exposure and risk.

Threat actors are increasingly targeting vulnerabilities in mobile devices, IoT systems, and legacy OT environments to gain access to critical environments. And few sectors face higher stakes than the public sector when mobile, IoT, and OT systems are compromised.

New research from Zscaler ThreatLabz reveals a surge in these attacks across government, healthcare, and education over the past year. From Android malware campaigns to IoT botnets overwhelming critical systems, the convergence of connected technologies continues to extend threat actors’ reach across public sector infrastructures.

In the sections that follow, we’ll highlight key research findings from the Zscaler ThreatLabz 2025 Mobile, IoT, and OT Threat Report, including how IoT malware and mobile attacks are particularly impacting the government, healthcare, and education sectors.

Securing the public sector’s connected future

Addressing existing and emerging mobile and IoT/OT risks requires visibility and control across every connected device, application, and user. Zscaler helps organizations meet this challenge by extending zero trust protection to the people, devices, and applications that power essential public services. 

Through the Zscaler Zero Trust Exchange, public sector agencies and organizations can isolate threats, enforce segmentation, and gain comprehensive visibility into attack surfaces within dynamic, distributed environments. Whether securing a remote clinic, a university campus, or a field operations site, Zscaler delivers consistent protection and traffic monitoring across connected endpoints. This enables security teams to detect vulnerabilities early and prevent lateral movement that could disrupt essential services. 

Actionable steps for public sector leaders 

Public sector leaders can take the following actions to mitigate risk and proactively secure mobile and IoT/OT ecosystems:

  1. Implement zero trust for critical networks: Adopt a zero trust architecture to secure cellular IoT connections, isolate unmanaged OT systems into “networks of one,” and prevent lateral movement by enforcing strict device segmentation.
  2. Protect IoT and cellular gateways: Secure the IoT and cellular gateways that connect internal systems to cloud infrastructure through continuous traffic monitoring, anomaly detection, and firmware integrity checks to counter supply chain risks and botnet recruitment vulnerabilities.
  3. Enhance supply chain risk management: Establish strict IoT device procurement and onboarding security standards that align with CISA and NIST guidelines. Require vendor compliance on encryption, secure firmware updates, and transparency.
  4. Strengthen mobile endpoint protection: Deploy advanced protections for mobile endpoints, including anomaly detection for SIM-level traffic, phishing detection across all managed devices, and strict enforcement of application control policies.
  5. Foster collaborative threat intelligence: Collaborate across agencies and industry partners through intelligence-sharing programs to share insights on nation-state campaigns, botnet activity, and IoT vulnerabilities.

     

Get the report: ThreatLabz 2025 Mobile, IoT, and OT Threat Report

By applying zero trust principles across mobile, IoT, and OT environments, the public sector can reduce risk, prevent lateral movement, and ensure secure delivery of essential services. 

Learn more about how connected threats are evolving—and how zero trust can help you manage and mitigate them. Explore the full research and findings in the ThreatLabz 2025 Mobile, IoT, and OT Threat Report.

form submtited
Thank you for reading

Was this post useful?

Disclaimer: This blog post has been created by Zscaler for informational purposes only and is provided "as is" without any guarantees of accuracy, completeness or reliability. Zscaler assumes no responsibility for any errors or omissions or for any actions taken based on the information provided. Any third-party websites or resources linked in this blog post are provided for convenience only, and Zscaler is not responsible for their content or practices. All content is subject to change without notice. By accessing this blog, you agree to these terms and acknowledge your sole responsibility to verify and use the information as appropriate for your needs.

Get the latest Zscaler blog updates in your inbox

By submitting the form, you are agreeing to our privacy policy.