Security a top priority as IoT reaches $1.5 trillion by 2027

Issue 4 2021 Infrastructure

Driven by increased adoption of smart sensors integrated into connected devices, the Internet of Things market segment is projected to reach $1.5 trillion by 2027. These devices are being made and sold by some of the largest technology companies in the world into the manufacturing, retail, government, healthcare, consumer, transportation, IT and telecom markets. While IoT devices have the opportunity to revolutionise the way people work, live and play, insufficient implementation of embedded security has the potential to derail these benefits.

With the number of IoT devices forecast to triple to more than 75 billion units over the next few years, there will be a corresponding increase in the number of issues and vulnerabilities that cybercriminals can exploit. According to Forrester Consulting, the state of enterprise IoT security is unmanaged and unsecured:

84% of security professionals believe IoT devices are more vulnerable than computers.

• Two-thirds of enterprises have already experienced an IoT security incident.

• Only 16% of enterprise security managers say they have adequate visibility of IoT devices in their environments.

“Security is a critical element of IoT deployment, yet it is often neglected in the development process,” said Phil Attfield, CEO, Sequitur Labs. “IoT manufacturers need to come up with security practices to protect both proprietary edge device IP and customer data/privacy. Lack of IoT device security exposes customers to the danger of a breach that can lead to IP theft, damage to a company’s brand and loss of customer trust. With trillions of dollars on the line, there is an immediate need to secure devices across their entire lifecycle to help overcome complex cybersecurity challenges.”

Device management represents just over a third of the IoT market, along with network management and cloud platforms. However, not enough of that device management is being dedicated to deploying the best security practices.

“If manufacturers do not implement IoT device security practices, the government will likely step in to regulate this area as part of their consumer protection policies,” said Attfield. “One way for manufacturers to get ahead of the curve and implement security at the device level is through technologies like the EmSPARK Security Suite.”

Sequitur Labs’ EmSPARK Security Suite was designed to address solutions in industries where embedded security is paramount, in particular, protection of AI models at the edge. Supporting security functions for encryption, storage, data transmission and key/certificate management are delivered by EmSPARK and housed in a microprocessor’s secure memory partition. IoT hardware manufacturers use EmSPARK to easily implement device-level security by addressing technical, IP, supply chain and business process challenges. Developers can easily build applications that use secure resources without having to become experts in cryptography and complex chip-level security technologies.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Cyber resilience – protect, defend, recover
Infrastructure
The challenge with AI is that threats are getting harder to detect. As a result, plans in 2024 are not just about detection and prevention, but about recovery.

Read more...
Powering business resilience and field operations
Infrastructure Products & Solutions
[Sponsored] The Anker 757 Portable Power Station emerges as a strategic asset for businesses looking to overcome power instability and the demand for operational efficiency in remote and field-based environments.

Read more...
Top bets for backup and business continuity
Infrastructure
Become your organisation’s data pioneer and spearhead data governance and protection of critical data. Challenge why best practices are not adopted or in place, while highlighting the inherent risks this poses.

Read more...
Next-gen solar-powered switches
Infrastructure
Duxbury Networking has introduced its range of solar unmanaged switches, which are ideal for any environment requiring reliable Power-over-Ethernet (PoE) capabilities, such as IP phones, cameras, and access points.

Read more...
Navigating South Africa's cybersecurity regulations
Sophos Information Security Infrastructure
[Sponsored] Data privacy and compliance are not just buzzwords; they are essential components of a robust cybersecurity strategy that cannot be ignored. Understanding and adhering to local data protection laws and regulations becomes paramount.

Read more...
Creating a cybersecurity strategy in a world where threats never sleep
Information Security Infrastructure
[Sponsored Content] The boom of Internet of Things (IoT) technology and the chaos that surrounded the sudden shift to work-from-home models in 2020 kick-started the age of cybercrime. In that period, incidents rose by 600%, affecting every industry and showing no signs of slowing down.

Read more...
Gallagher Security’s achieves SOC2 Type 2 recertification
Gallagher News & Events Integrated Solutions Infrastructure
Gallagher has achieved System and Organization Controls (SOC2 Type 2) recertification after a fresh audit of the cloud-hosted services of its integrated security solution, Command Centre. The recertification was achieved on 21 December 2023.

Read more...
Cyberattacks the #1 cause of business outages
Editor's Choice Information Security Infrastructure
The latest survey by Veeam Software shows that 92% of organizations will increase their spending on data protection by 2024 to achieve cyber resilience due to continued threats of ransomware and cyberattacks.

Read more...
Nology races to end 2023
Editor's Choice News & Events Infrastructure
Nology ended 2023 with an event highlighting its various products and services to the local market, followed by a few laps around the Kyalami Indoor Karting track.

Read more...
Cybersecurity integrated with data protection
Technews Publishing News & Events Infrastructure
Last year's VeeamOn Tour conference in South Africa was a smaller version of the annual global Veeam conference, aimed at the company's regional partners and customers.

Read more...