Zscaler Blog

Erhalten Sie die neuesten Zscaler Blog-Updates in Ihrem Posteingang

Security Research

Mobile, IoT, and OT Risks Converge in the Public Sector

HEATHER BATES, ADAM FORD
November 06, 2025 - 5 Lesezeit: Min

Connected technology is central to how governments, healthcare providers, and schools operate today. We see it all around us: public safety cameras across cities, medical devices in hospitals, and digital learning tools used in classrooms every day. But with this dependence comes exposure and risk.

Threat actors are increasingly targeting vulnerabilities in mobile devices, IoT systems, and legacy OT environments to gain access to critical environments. And few sectors face higher stakes than the public sector when mobile, IoT, and OT systems are compromised.

New research from Zscaler ThreatLabz reveals a surge in these attacks across government, healthcare, and education over the past year. From Android malware campaigns to IoT botnets overwhelming critical systems, the convergence of connected technologies continues to extend threat actors’ reach across public sector infrastructures.

In the sections that follow, we’ll highlight key research findings from the Zscaler ThreatLabz 2025 Mobile, IoT, and OT Threat Report, including how IoT malware and mobile attacks are particularly impacting the government, healthcare, and education sectors.

Securing the public sector’s connected future

Addressing existing and emerging mobile and IoT/OT risks requires visibility and control across every connected device, application, and user. Zscaler helps organizations meet this challenge by extending zero trust protection to the people, devices, and applications that power essential public services. 

Through the Zscaler Zero Trust Exchange, public sector agencies and organizations can isolate threats, enforce segmentation, and gain comprehensive visibility into attack surfaces within dynamic, distributed environments. Whether securing a remote clinic, a university campus, or a field operations site, Zscaler delivers consistent protection and traffic monitoring across connected endpoints. This enables security teams to detect vulnerabilities early and prevent lateral movement that could disrupt essential services. 

Actionable steps for public sector leaders 

Public sector leaders can take the following actions to mitigate risk and proactively secure mobile and IoT/OT ecosystems:

  1. Implement zero trust for critical networks: Adopt a zero trust architecture to secure cellular IoT connections, isolate unmanaged OT systems into “networks of one,” and prevent lateral movement by enforcing strict device segmentation.
  2. Protect IoT and cellular gateways: Secure the IoT and cellular gateways that connect internal systems to cloud infrastructure through continuous traffic monitoring, anomaly detection, and firmware integrity checks to counter supply chain risks and botnet recruitment vulnerabilities.
  3. Enhance supply chain risk management: Establish strict IoT device procurement and onboarding security standards that align with CISA and NIST guidelines. Require vendor compliance on encryption, secure firmware updates, and transparency.
  4. Strengthen mobile endpoint protection: Deploy advanced protections for mobile endpoints, including anomaly detection for SIM-level traffic, phishing detection across all managed devices, and strict enforcement of application control policies.
  5. Foster collaborative threat intelligence: Collaborate across agencies and industry partners through intelligence-sharing programs to share insights on nation-state campaigns, botnet activity, and IoT vulnerabilities.

     

Get the report: ThreatLabz 2025 Mobile, IoT, and OT Threat Report

By applying zero trust principles across mobile, IoT, and OT environments, the public sector can reduce risk, prevent lateral movement, and ensure secure delivery of essential services. 

Learn more about how connected threats are evolving—and how zero trust can help you manage and mitigate them. Explore the full research and findings in the ThreatLabz 2025 Mobile, IoT, and OT Threat Report.

form submtited
Danke fürs Lesen

War dieser Beitrag nützlich?

Haftungsausschluss: Dieser Blog-Beitrag wurde von Zscaler ausschließlich zu Informationszwecken erstellt und wird ohne jegliche Garantie für Richtigkeit, Vollständigkeit oder Zuverlässigkeit zur Verfügung gestellt. Zscaler übernimmt keine Verantwortung für etwaige Fehler oder Auslassungen oder für Handlungen, die auf der Grundlage der bereitgestellten Informationen vorgenommen werden. Alle in diesem Blog-Beitrag verlinkten Websites oder Ressourcen Dritter werden nur zu Ihrer Information zur Verfügung gestellt, und Zscaler ist nicht für deren Inhalte oder Datenschutzmaßnahmen verantwortlich. Alle Inhalte können ohne vorherige Ankündigung geändert werden. Mit dem Zugriff auf diesen Blog-Beitrag erklären Sie sich mit diesen Bedingungen einverstanden und nehmen zur Kenntnis, dass es in Ihrer Verantwortung liegt, die Informationen zu überprüfen und in einer Ihren Bedürfnissen angemessenen Weise zu nutzen.

Erhalten Sie die neuesten Zscaler Blog-Updates in Ihrem Posteingang

Mit dem Absenden des Formulars stimmen Sie unserer Datenschutzrichtlinie zu.