IoT: big opportunities, bigger challenges

October 2016 Information Security, Integrated Solutions, Infrastructure

Much like cloud and mobility before it, the Internet of things (IoT) is a topic on everyone’s lips, and nowhere is this truer than in the security industry. “Although the IoT is partly a hype, it is definitely a topic that security practitioners need to familiarise themselves with, and add to the business strategy as a whole,” says Lutz Blaeser, MD of Intact Security.

Lutz Blaeser, MD of Intact Security.
Lutz Blaeser, MD of Intact Security.

In today’s world, he says, all devices – products, sensors, wearables, mobiles – are connected to the Internet and to each other. “Naturally this brings a ton of business opportunities, including better customer service, and products, and access to a previously undreamed of amount of information. However, hand in hand with these benefits, come a slew of security challenges and concerns. Anything that is connected to the Internet is vulnerable to attack.

Blaeser says some recent research conducted by analysts at Gartner revealed that organisations are spending more on security related to the IoT. The study showed that worldwide IoT security spending will reach $348 million this year, a 24% increase from last year, and is expected to reach $547 million in the year 2018.

Gartner says overall spending will be moderate at first, but predicts that IoT security spending will grow increasingly quickly after 2020, as improved skills, business change and more scalable service offerings improve on execution.

This focus on IoT security is good, as Gartner also believes that by 2020, one quarter of identified attacks in the enterprise will be linked to IoT in one way or another. “The challenge for security vendors will be to provide usable IoT security features in spite of the limited spend assigned to this area, and the often decentralised approach to the initial IoT implementations within businesses.”

Blaeser says the survey revealed another alarming fact: “44% of businesses that admitted to being hacked could not pinpoint the source or type of attack or what the duration of the breach really was. Also, a mere 7% of technical departments allocate over 50% of their time to security. Moreover, more than half those who responded (56%), stated that the insider threat in the form of careless end-users constitutes the biggest security threat to their IoT networks.“

The IoT is growing in importance, and will most likely rise to among the top security priorities and concerns in the years to come. “As technology, and day-to-day devices become more and more interlinked, the consequences of security failure become more and more catastrophic. We have seen cars being hacked. Medical devices such as pacemakers and insulin pumps too. Home lighting systems, fridges, baby monitors. Since computers now control pretty much every device we use, little imagination is needed to picture the worst possible case scenario, should an adversary want to do us harm,” Blaeser says.

As the IoT embeds itself in every aspect of our lives, from industrial control systems to personal devices and the infrastructure we use for transport and power supply, these possible scenarios become more terrifying, he concludes. “It is for this reason that IoT security needs to be top of mind, and vendors and security practitioners need to work together to ensure the IoT world is a safe one.”

For more information contact Intact Software Distribution, +27 (0)21 487 4640, [email protected], intactsoftwaredistribution.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Hytera supports communication upgrade for Joburg
News & Events Infrastructure Government and Parastatal (Industry)
By equipping Johannesburg’s metro police and emergency services with multimode radios which integrate TETRA and LTE networks, Hytera is bridging coverage gaps and improving response times across the city.

Read more...
Want effective Attack Surface Management? Think like an attacker.
Information Security
Effective ASM requires companies to think like attackers, anticipate risks, and act decisively to reduce exposure by knowing their environment, deploying a structured approach, leveraging capable tools, and addressing both internal and external risks.

Read more...
The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
POPIA non-compliance puts municipalities at risk
Information Security Government and Parastatal (Industry)
Digital responsibility must go beyond POPIA compliance to recognising that privacy and service delivery are fundamentally linked. Despite this, only 51 out of 257 municipalities submitted their mandatory data protection and access to information reports in 2024.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...
Most wanted malware
News & Events Information Security
Check Point Software Technologies unveiled its Global Threat Index for June 2025, highlighting a surge in new and evolving threats. Eight African countries are among the most targeted as malware leaders AsyncRAT and FakeUpdates expand.

Read more...
IoT-driven smart data to stay ahead
IoT & Automation Infrastructure AI & Data Analytics
In a world where uncertainty is constant, the real competitive edge lies in foresight. Businesses that turn real-time data into proactive strategies will not just survive, they will lead.

Read more...
Hydrogen is green but dangerous
Fire & Safety Infrastructure Power Management
Hydrogen infrastructure is developing quickly, but it comes with safety challenges. Hydrogen is flammable, and its small molecular size means it can leak easily. Additionally, fires caused by hydrogen are nearly invisible, making them difficult to detect and respond to.

Read more...
Welcome to the new cyber battleground
Information Security
The Iran-Israel conflict is rapidly redefining modern warfare, pushing the boundaries of cyber capabilities and creating a new, borderless digital battlefield. Fortinet’s CISO, Dr Carl Windsor, offers a critical, in-depth analysis of the escalating tactics and global implications in his latest report.

Read more...
A whole-site solution to crack the data centre market
Fire & Safety Infrastructure Facilities & Building Management
Fire safety consultants and contractors who can offer a comprehensive fire safety solution to the data centre market can establish themselves as a supplier of a key safety features that help guarantee the smooth operation of critical infrastructure.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.