Finding and Fixing Blind Spots in Enterprise IoT Security

JOSEPH CHUKWUBE | March 20, 2020

article image
The Internet of Things has been a breakthrough, and adoption rates keep exploding. There are possibly over 20 billion IoT devices in the world, and by 2025, there may have been 75 billion. Even though there has been a rise in smart home devices, most IoT devices are found in businesses, industries, and healthcare. The benefits are overwhelming: from enabling automation of repetitive tasks (both simple and complex), to real-time data insights and analytics, IoT devices make workers more productive, improve customer experience, and reduce operating costs. However, with the many benefits of IoT devices come serious disadvantages, chief of which is security. Here are some reasons why IoT devices have such serious security risks:

Spotlight

Ivy Comptech

IVY Comptech Private Limited (IVY) is a group company of a FTSE 100 listed entity - GVC Holdings Plc., (UK). GVC is engaged in providing online and retail gaming in regulated markets, and owns marquee brands such as Bwin, Ladbrokes, Gala Coral, Partypoker, FoxyBingo, Sportingbet, Eurobet etc.,

OTHER ARTICLES

Make Room For Public Clouds In Your Industrial IoT Strategy

Article | March 1, 2020

Not too long ago, executives from manufacturing and related industries would not consider running their internet of things (IoT) initiatives from a cloud. Now? It’s hard to find one who doesn’t enthusiastically embrace some role for the public cloud. Makers of industrial IoT (IIoT) software platforms have undergone a similar change of heart, pivoting from making grand plans for multibillion-dollar global data center rollouts to wholeheartedly partnering with one or more of the hyperscale public clouds. So far, so simple: Public cloud is definitely now part of the industrial IoT story. But there are a multitude of ways to use a public cloud, from just installing your own software there to fully integrating with all of the cloud, development, and IoT services that the hyperscale public cloud platforms increasingly offer. I explore this range of options in my latest report, “Hyperscale Public Clouds Power Your Industrial IoT Future,” and shall be discussing the issues in a client webinar on March 31.

Read More

Hardware Threats to an IoT Ecosystem

Article | March 31, 2020

An IoT ecosystem, like any biome on Earth, is constantly subjected to changes and threats at various scales. Whether the system is an asset tracking solution in a hospital to help deliver more effective healthcare or cold chain management ensuring temperature control during transportation, the hardware/sensor is where the data journey commences in an IoT ecosystem. The integrity of these hardware components is paramount to the success of an IoT solution, but there are currently critical threat points on these devices which left unaddressed could be disastrous. Much of the focus of IoT security is on keeping the communicated data from IoT devices untampered up the solution stack. Methods like end-to-end AES encryption are currently standard by most network protocols and are well secured and tested.

Read More

Building a Cold Chain Management IoT Solution

Article | February 27, 2020

Artificial intelligence (AI) has existed in the public consciousness for decades. The (mostly) sentient machines playing the villains in Hollywood movies have never been realistic depictions of the technology, but they have left an impression, nonetheless. AI has proved as exciting to the layman as it is to the expert. Usually based in remote data centers, AI is capable of collecting and examining immense volumes of data, generating insights based on analytical algorithms. With varying degrees of autonomy, these capabilities have been put to use streamlining decision-making processes. While AI is often thought of as a product in its own right, it is increasingly intersecting with other parallel trends. Chief among these is the Internet of things (IoT), which enables previously isolated machines to “talk” to one another and, at the same time, generate data that makes new modes of operation a possibility.

Read More

An Introduction to IoT Sensors

Article | March 5, 2020

This post will cover various important sensors that are possibilities for an IoT deployment. Sensors are the backbone of any IoT deployment. They gather information and provide software with sensory information it needs to achieve its full potential. In addition, this post will go over considerations and decision-making for selecting sensors in an IoT deployment. Often times, a single sensor is not the best implementation, a suite of sensors can gather more data and even affect behavior for other sensors. In many cases, more than one sensor is necessary to perform the IoT deployment’s function. Sensors are just as critical to every IoT application as the internet. Imagine Alexa or Google Home without a microphone: it wouldn’t work. People wouldn’t be able to interact with the device, or it would need some other kind of sensor such as a keyboard to obtain input from a user.

Read More

Spotlight

Ivy Comptech

IVY Comptech Private Limited (IVY) is a group company of a FTSE 100 listed entity - GVC Holdings Plc., (UK). GVC is engaged in providing online and retail gaming in regulated markets, and owns marquee brands such as Bwin, Ladbrokes, Gala Coral, Partypoker, FoxyBingo, Sportingbet, Eurobet etc.,

Events