IoT: big opportunities, bigger challenges

October 2016 Information Security, Integrated Solutions, Infrastructure

Much like cloud and mobility before it, the Internet of things (IoT) is a topic on everyone’s lips, and nowhere is this truer than in the security industry. “Although the IoT is partly a hype, it is definitely a topic that security practitioners need to familiarise themselves with, and add to the business strategy as a whole,” says Lutz Blaeser, MD of Intact Security.

Lutz Blaeser, MD of Intact Security.
Lutz Blaeser, MD of Intact Security.

In today’s world, he says, all devices – products, sensors, wearables, mobiles – are connected to the Internet and to each other. “Naturally this brings a ton of business opportunities, including better customer service, and products, and access to a previously undreamed of amount of information. However, hand in hand with these benefits, come a slew of security challenges and concerns. Anything that is connected to the Internet is vulnerable to attack.

Blaeser says some recent research conducted by analysts at Gartner revealed that organisations are spending more on security related to the IoT. The study showed that worldwide IoT security spending will reach $348 million this year, a 24% increase from last year, and is expected to reach $547 million in the year 2018.

Gartner says overall spending will be moderate at first, but predicts that IoT security spending will grow increasingly quickly after 2020, as improved skills, business change and more scalable service offerings improve on execution.

This focus on IoT security is good, as Gartner also believes that by 2020, one quarter of identified attacks in the enterprise will be linked to IoT in one way or another. “The challenge for security vendors will be to provide usable IoT security features in spite of the limited spend assigned to this area, and the often decentralised approach to the initial IoT implementations within businesses.”

Blaeser says the survey revealed another alarming fact: “44% of businesses that admitted to being hacked could not pinpoint the source or type of attack or what the duration of the breach really was. Also, a mere 7% of technical departments allocate over 50% of their time to security. Moreover, more than half those who responded (56%), stated that the insider threat in the form of careless end-users constitutes the biggest security threat to their IoT networks.“

The IoT is growing in importance, and will most likely rise to among the top security priorities and concerns in the years to come. “As technology, and day-to-day devices become more and more interlinked, the consequences of security failure become more and more catastrophic. We have seen cars being hacked. Medical devices such as pacemakers and insulin pumps too. Home lighting systems, fridges, baby monitors. Since computers now control pretty much every device we use, little imagination is needed to picture the worst possible case scenario, should an adversary want to do us harm,” Blaeser says.

As the IoT embeds itself in every aspect of our lives, from industrial control systems to personal devices and the infrastructure we use for transport and power supply, these possible scenarios become more terrifying, he concludes. “It is for this reason that IoT security needs to be top of mind, and vendors and security practitioners need to work together to ensure the IoT world is a safe one.”

For more information contact Intact Software Distribution, +27 (0)21 487 4640, [email protected], intactsoftwaredistribution.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What are MFA fatigue attacks, and how can they be prevented?
Information Security
Multifactor authentication is a security measure that requires users to provide a second form of verification before they can log into a corporate network. It has long been considered essential for keeping fraudsters out. However, cybercriminals have been discovering clever ways to bypass it.

Read more...
SA's cybersecurity risks to watch
Information Security
The persistent myth is that cybercrime only targets the biggest companies and economies, but cybercriminals are not bound by geography, and rapidly digitising economies lure them in large numbers.

Read more...
Cyber insurance a key component in cyber defence strategies
Information Security
[Sponsored] Cyber insurance has become a key part of South African organisations’ risk reduction strategies, driven by the need for additional financial protection and contingency plans in the event of a cyber incident.

Read more...
Deception technology crucial to unmasking data theft
Information Security Security Services & Risk Management
The ‘silent theft’ of data is an increasingly prevalent cyber threat to businesses, driving the ongoing leakage of personal information in the public domain through undetected attacks that cannot even be policed by data privacy legislation.

Read more...
Data security and privacy in global mobility
Security Services & Risk Management Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...
Future trends for electronic safety and security in mining
Fang Fences & Guards Mining (Industry) Integrated Solutions AI & Data Analytics
The mining industry is ever evolving, driven by technological advancements and the growing need for enhanced safety and security measures, with significant innovation seen in turnkey electronic security for mining operations.

Read more...
Unlocking enhanced security for mining
Mining (Industry) Integrated Solutions
In the dynamic landscape of African mining, security remains of paramount concern as threats evolve and challenges persist, and mining companies seek innovative solutions to safeguard their operations, assets, and personnel.

Read more...
A constant armed struggle
Technews Publishing XtraVision Editor's Choice Integrated Solutions Mining (Industry) IoT & Automation
SMART Security Solutions asked a few people involved in servicing mines to join us for a virtual round table and give us their insights into mine security today. A podcast of the discussion will be released shortly-stay tuned.

Read more...
The CIPC hack has potentially serious consequences
Editor's Choice Information Security
A cyber breach at the South African Companies and Intellectual Property Commission (CIPC) has put millions of companies at risk. The organisation holds a vast database of registration details, including sensitive data like ID numbers, addresses, and contact information.

Read more...