Blog da Zscaler

Receba as últimas atualizações do blog da Zscaler na sua caixa de entrada

Security Research

Mobile, IoT, and OT Risks Converge in the Public Sector

HEATHER BATES, ADAM FORD
November 06, 2025 - 5 Min. de leitura

Connected technology is central to how governments, healthcare providers, and schools operate today. We see it all around us: public safety cameras across cities, medical devices in hospitals, and digital learning tools used in classrooms every day. But with this dependence comes exposure and risk.

Threat actors are increasingly targeting vulnerabilities in mobile devices, IoT systems, and legacy OT environments to gain access to critical environments. And few sectors face higher stakes than the public sector when mobile, IoT, and OT systems are compromised.

New research from Zscaler ThreatLabz reveals a surge in these attacks across government, healthcare, and education over the past year. From Android malware campaigns to IoT botnets overwhelming critical systems, the convergence of connected technologies continues to extend threat actors’ reach across public sector infrastructures.

In the sections that follow, we’ll highlight key research findings from the Zscaler ThreatLabz 2025 Mobile, IoT, and OT Threat Report, including how IoT malware and mobile attacks are particularly impacting the government, healthcare, and education sectors.

Securing the public sector’s connected future

Addressing existing and emerging mobile and IoT/OT risks requires visibility and control across every connected device, application, and user. Zscaler helps organizations meet this challenge by extending zero trust protection to the people, devices, and applications that power essential public services. 

Through the Zscaler Zero Trust Exchange, public sector agencies and organizations can isolate threats, enforce segmentation, and gain comprehensive visibility into attack surfaces within dynamic, distributed environments. Whether securing a remote clinic, a university campus, or a field operations site, Zscaler delivers consistent protection and traffic monitoring across connected endpoints. This enables security teams to detect vulnerabilities early and prevent lateral movement that could disrupt essential services. 

Actionable steps for public sector leaders 

Public sector leaders can take the following actions to mitigate risk and proactively secure mobile and IoT/OT ecosystems:

  1. Implement zero trust for critical networks: Adopt a zero trust architecture to secure cellular IoT connections, isolate unmanaged OT systems into “networks of one,” and prevent lateral movement by enforcing strict device segmentation.
  2. Protect IoT and cellular gateways: Secure the IoT and cellular gateways that connect internal systems to cloud infrastructure through continuous traffic monitoring, anomaly detection, and firmware integrity checks to counter supply chain risks and botnet recruitment vulnerabilities.
  3. Enhance supply chain risk management: Establish strict IoT device procurement and onboarding security standards that align with CISA and NIST guidelines. Require vendor compliance on encryption, secure firmware updates, and transparency.
  4. Strengthen mobile endpoint protection: Deploy advanced protections for mobile endpoints, including anomaly detection for SIM-level traffic, phishing detection across all managed devices, and strict enforcement of application control policies.
  5. Foster collaborative threat intelligence: Collaborate across agencies and industry partners through intelligence-sharing programs to share insights on nation-state campaigns, botnet activity, and IoT vulnerabilities.

     

Get the report: ThreatLabz 2025 Mobile, IoT, and OT Threat Report

By applying zero trust principles across mobile, IoT, and OT environments, the public sector can reduce risk, prevent lateral movement, and ensure secure delivery of essential services. 

Learn more about how connected threats are evolving—and how zero trust can help you manage and mitigate them. Explore the full research and findings in the ThreatLabz 2025 Mobile, IoT, and OT Threat Report.

form submtited
Obrigado por ler

Esta postagem foi útil??

Aviso legal: este post no blog foi criado pela Zscaler apenas para fins informativos e é fornecido "no estado em que se encontra", sem quaisquer garantias de exatidão, integridade ou confiabilidade. A Zscaler não se responsabiliza por quaisquer erros, omissões ou por quaisquer ações tomadas com base nas informações fornecidas. Quaisquer sites ou recursos de terceiros vinculados neste post são fornecidos apenas para sua conveniência, e a Zscaler não se responsabiliza por seu conteúdo ou práticas. Todo o conteúdo está sujeito a alterações sem aviso prévio. Ao acessar este blog, você concorda com estes termos e reconhece que é de sua exclusiva responsabilidade verificar e utilizar as informações conforme apropriado para suas necessidades.

Receba as últimas atualizações do blog da Zscaler na sua caixa de entrada

Ao enviar o formulário, você concorda com nossa política de privacidade.