IoT: big opportunities, bigger challenges

October 2016 Information Security, Integrated Solutions, Infrastructure

Much like cloud and mobility before it, the Internet of things (IoT) is a topic on everyone’s lips, and nowhere is this truer than in the security industry. “Although the IoT is partly a hype, it is definitely a topic that security practitioners need to familiarise themselves with, and add to the business strategy as a whole,” says Lutz Blaeser, MD of Intact Security.

Lutz Blaeser, MD of Intact Security.
Lutz Blaeser, MD of Intact Security.

In today’s world, he says, all devices – products, sensors, wearables, mobiles – are connected to the Internet and to each other. “Naturally this brings a ton of business opportunities, including better customer service, and products, and access to a previously undreamed of amount of information. However, hand in hand with these benefits, come a slew of security challenges and concerns. Anything that is connected to the Internet is vulnerable to attack.

Blaeser says some recent research conducted by analysts at Gartner revealed that organisations are spending more on security related to the IoT. The study showed that worldwide IoT security spending will reach $348 million this year, a 24% increase from last year, and is expected to reach $547 million in the year 2018.

Gartner says overall spending will be moderate at first, but predicts that IoT security spending will grow increasingly quickly after 2020, as improved skills, business change and more scalable service offerings improve on execution.

This focus on IoT security is good, as Gartner also believes that by 2020, one quarter of identified attacks in the enterprise will be linked to IoT in one way or another. “The challenge for security vendors will be to provide usable IoT security features in spite of the limited spend assigned to this area, and the often decentralised approach to the initial IoT implementations within businesses.”

Blaeser says the survey revealed another alarming fact: “44% of businesses that admitted to being hacked could not pinpoint the source or type of attack or what the duration of the breach really was. Also, a mere 7% of technical departments allocate over 50% of their time to security. Moreover, more than half those who responded (56%), stated that the insider threat in the form of careless end-users constitutes the biggest security threat to their IoT networks.“

The IoT is growing in importance, and will most likely rise to among the top security priorities and concerns in the years to come. “As technology, and day-to-day devices become more and more interlinked, the consequences of security failure become more and more catastrophic. We have seen cars being hacked. Medical devices such as pacemakers and insulin pumps too. Home lighting systems, fridges, baby monitors. Since computers now control pretty much every device we use, little imagination is needed to picture the worst possible case scenario, should an adversary want to do us harm,” Blaeser says.

As the IoT embeds itself in every aspect of our lives, from industrial control systems to personal devices and the infrastructure we use for transport and power supply, these possible scenarios become more terrifying, he concludes. “It is for this reason that IoT security needs to be top of mind, and vendors and security practitioners need to work together to ensure the IoT world is a safe one.”

For more information contact Intact Software Distribution, +27 (0)21 487 4640, [email protected], intactsoftwaredistribution.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Advanced Perimeter Intrusion Detection Systems
XtraVision OPTEX Technews Publishing Modular Communications Perimeter Security, Alarms & Intruder Detection Integrated Solutions Products & Solutions
Making full use of fibre installations around the perimeter by adding Perimeter Intrusion Detection Systems means you can easily add another layer of security to existing surveillance and fencing systems.

Read more...
A critical component of perimeter security
Nemtek Electric Fencing Products Gallagher Technews Publishing Stafix Editor's Choice Perimeter Security, Alarms & Intruder Detection Integrated Solutions
Electric fences are standard in South Africa, but today, they also need to be able to integrate with other technologies and become part of a broader perimeter security solution.

Read more...
There is a SaaS for everything, but at what cost, especially to SMEs?
Editor's Choice Information Security Security Services & Risk Management
Relying on SaaS platforms presents significant cybersecurity risks as the number of providers in your landscape increases, expanding your attack surface. It is important to assess the strength of the SaaS providers in your chain.

Read more...
Addressing today’s mining challenges: cyber risks beyond IT
Editor's Choice Information Security Mining (Industry)
Despite the mining industry’s operational technology systems being vulnerable to cyberattacks, many decision-makers still see these threats as purely an IT issue, even though a breach could potentially disrupt mining operations.

Read more...
Get proactive with cybersecurity
Information Security
The ability to respond effectively to a cybersecurity breach is critical, but the missing piece of the puzzle is a thorough, proactive evaluation to ascertain weaknesses and identify any hidden threats.

Read more...
How to effectively share household devices
Smart Home Automation Information Security
Sharing electronic devices within a household is unavoidable. South African teens spend over eight hours per day online, making device sharing among family members commonplace. Fortunately, there are methods to guarantee safe usage for everyone.

Read more...
Western Digital reveals new solutions
Products & Solutions News & Events Infrastructure
Western Digital unveiled new solutions and technology demonstrations at the Future of Memory and Storage Conference 2024. The innovations cater to diverse market segments, from hyperscale cloud to automotive and consumer storage.

Read more...
How to securely manage your digital footprint
Information Security Training & Education
Managing your online presence is critical to safeguarding your privacy and security. It is imperative to take a proactive approach, including using robust cybersecurity best practices.

Read more...
The state of code security in 2024
Information Security
The 2024 State of Code Security survey reveals that organisations have continued to shore up application security defences over the last year, according to OpenText Premier Partner iOCO Application Management.

Read more...