'As long as businesses do not consider cyber recovery an integral part of their enterprise IT, they remain greatly vulnerable.'
Even devices such as connected lights, doorbells -- even garden sprinklers -- are all at risk from attackers who can remotely, or even physically, access them to dump firmware, warns Nir Chako, security research team leader, CyberArk, a security software company.