Blog Zscaler

Ricevi gli ultimi aggiornamenti dal blog di Zscaler nella tua casella di posta

Security Research

Mobile, IoT, and OT Risks Converge in the Public Sector

HEATHER BATES, ADAM FORD
novembre 06, 2025 - 5 Minuti di lettura

Connected technology is central to how governments, healthcare providers, and schools operate today. We see it all around us: public safety cameras across cities, medical devices in hospitals, and digital learning tools used in classrooms every day. But with this dependence comes exposure and risk.

Threat actors are increasingly targeting vulnerabilities in mobile devices, IoT systems, and legacy OT environments to gain access to critical environments. And few sectors face higher stakes than the public sector when mobile, IoT, and OT systems are compromised.

New research from Zscaler ThreatLabz reveals a surge in these attacks across government, healthcare, and education over the past year. From Android malware campaigns to IoT botnets overwhelming critical systems, the convergence of connected technologies continues to extend threat actors’ reach across public sector infrastructures.

In the sections that follow, we’ll highlight key research findings from the Zscaler ThreatLabz 2025 Mobile, IoT, and OT Threat Report, including how IoT malware and mobile attacks are particularly impacting the government, healthcare, and education sectors.

Securing the public sector’s connected future

Addressing existing and emerging mobile and IoT/OT risks requires visibility and control across every connected device, application, and user. Zscaler helps organizations meet this challenge by extending zero trust protection to the people, devices, and applications that power essential public services. 

Through the Zscaler Zero Trust Exchange, public sector agencies and organizations can isolate threats, enforce segmentation, and gain comprehensive visibility into attack surfaces within dynamic, distributed environments. Whether securing a remote clinic, a university campus, or a field operations site, Zscaler delivers consistent protection and traffic monitoring across connected endpoints. This enables security teams to detect vulnerabilities early and prevent lateral movement that could disrupt essential services. 

Actionable steps for public sector leaders 

Public sector leaders can take the following actions to mitigate risk and proactively secure mobile and IoT/OT ecosystems:

  1. Implement zero trust for critical networks: Adopt a zero trust architecture to secure cellular IoT connections, isolate unmanaged OT systems into “networks of one,” and prevent lateral movement by enforcing strict device segmentation.
  2. Protect IoT and cellular gateways: Secure the IoT and cellular gateways that connect internal systems to cloud infrastructure through continuous traffic monitoring, anomaly detection, and firmware integrity checks to counter supply chain risks and botnet recruitment vulnerabilities.
  3. Enhance supply chain risk management: Establish strict IoT device procurement and onboarding security standards that align with CISA and NIST guidelines. Require vendor compliance on encryption, secure firmware updates, and transparency.
  4. Strengthen mobile endpoint protection: Deploy advanced protections for mobile endpoints, including anomaly detection for SIM-level traffic, phishing detection across all managed devices, and strict enforcement of application control policies.
  5. Foster collaborative threat intelligence: Collaborate across agencies and industry partners through intelligence-sharing programs to share insights on nation-state campaigns, botnet activity, and IoT vulnerabilities.

     

Get the report: ThreatLabz 2025 Mobile, IoT, and OT Threat Report

By applying zero trust principles across mobile, IoT, and OT environments, the public sector can reduce risk, prevent lateral movement, and ensure secure delivery of essential services. 

Learn more about how connected threats are evolving—and how zero trust can help you manage and mitigate them. Explore the full research and findings in the ThreatLabz 2025 Mobile, IoT, and OT Threat Report.

form submtited
Grazie per aver letto

Questo post è stato utile?

Esclusione di responsabilità: questo articolo del blog è stato creato da Zscaler esclusivamente a scopo informativo ed è fornito "così com'è", senza alcuna garanzia circa l'accuratezza, la completezza o l'affidabilità dei contenuti. Zscaler declina ogni responsabilità per eventuali errori o omissioni, così come per le eventuali azioni intraprese sulla base delle informazioni fornite. Eventuali link a siti web o risorse di terze parti sono offerti unicamente per praticità, e Zscaler non è responsabile del relativo contenuto, né delle pratiche adottate. Tutti i contenuti sono soggetti a modifiche senza preavviso. Accedendo a questo blog, l'utente accetta le presenti condizioni e riconosce di essere l'unico responsabile della verifica e dell'uso delle informazioni secondo quanto appropriato per rispondere alle proprie esigenze.

Ricevi gli ultimi aggiornamenti dal blog di Zscaler nella tua casella di posta

Inviando il modulo, si accetta la nostra Informativa sulla privacy.