The Internet of Things; The New Factor to Consider in IT Security

Steve Cox

The technology industry is well known for its love of jargon or ‘buzzwords’, which often seem designed specifically to confuse rather than clarify.

Over the last couple of years the so-called ‘Internet of Things’ (IoT) has been widely talked up but as is often the case the majority of by-standers remain largely unclear about what it really means.

It certainly has the potential to make a positive impact for businesses, their customers and for the general public.

Equally, it has the potential to cause significant disruption, especially if the security implications are overlooked.

In simple terms, any device that is capable of capturing, receiving or transmitting information via the internet, independent of direct user input, is effectively part of the Internet of Things.

In a domestic setting, that includes heating or lighting systems that can be operated remotely via the associated app on a mobile device.

One of the best examples in a commercial environment are the lifts, or elevators for those across the pond, with sensors to capture and communicate key datapoints that determine maintenance schedules rather than the traditional fixed service intervals.

Not only does that create efficiency, it also gives confidence that everything is operating safely. Win-win.

That is, of course, assuming that security on the devices involved has been set up correctly.

Sadly, that’s often not the case and there are numerous stories circulating about cameras installed in school classrooms with default passwords. For those who know what they’re doing that makes gaining access to live feeds a relatively straightforward exercise.

If basics such as password protocols aren’t addressed then there could be a frightening, and infinitely increasing, number of entry points through which hackers can access systems and data.

A recent study by HP suggested that smartwatches, either directly connected to the internet or connected via mobile devices, carry major security flaws.

And a YouTube video, posted in the last week, shows hackers taking control of a car on the public highway leaving the driver completely powerless. Thankfully, their aim is to raise awareness of the potential threat and encourage others to join them in ensuring that the industry take urgent action.

Scare-stories aside, more often than not the ultimate prize for the criminal hacker is data.

Data sits at the centre of most systems yet traditionally the focus has been on protecting the perimeter.

Unfortunately, a combination of the IoT and the proliferation of mobile devices makes it increasingly difficult to define, let alone protect, the perimeter.

The simple answer is shift the focus for IT security to the data.

And there are actually plenty of technologies focused on protecting data that have been around for years but are not in wide use.

Encryption effectively renders data worthless should it fall into the wrong hands.

More importantly, encryption can be applied at a number of levels including specific files or the devices themselves – everything from usb sticks and memory cards to laptops and smartphones.

So when you’re considering the future of your IT security arrangements, encryption should certainly be top of the list and well ahead of options such as sandboxing and demilitarised zones which bring us back to where we started.

Our best advice? Leave the jargon behind and keep it simple.

Technology Services Group (TSG) have created a series of Technology Talks focusing on IT security, including one about securing mobile devices and the potential impact of the IoT. View it on their blog, here.

By Steve Cox, COO at Technology Services Group (TSG)

Steve Cox began his career in IT services was with Ford Motor Company, building, installing and managing the internal communications system across their European network.

From there, he moved on to Top 5 accountancy firm Moore Stephens where he sat on their IT committee, looked after the partners and managed the transition from IBM OS2 to Windows, providing support for offices throughout the UK.

RECENT ARTICLES

5th Edition Connected Africa announces Telecom Innovation & Excellence Awards 2024

Posted on: April 19, 2024

The International Center for Strategic Alliances (ICSA) has announced the 5th Edition Connected Africa- Telecom Innovation & Excellence Awards 2024, set to be held on 22 May 2024 in Johannesburg, South Africa. Under the theme “Building a Connected Global Economy,” the summit aims to influence the telecom in Africa. With a focus on fostering forward-thinking

Read more

Facilio launches refrigerant tracking and leak detection software

Posted on: April 19, 2024

Property operations software firm Facilio has announced the launch of its ready-to-deploy refrigerant tracking and leak detection software solution. This is meant for all grocery and convenience store operators who want to implement an automatic leak detection system to identify and mitigate potential refrigerant leaks to achieve 100% compliance.

Read more
FEATURED IoT STORIES

What is IoT? A Beginner’s Guide

Posted on: April 5, 2023

What is IoT? IoT, or the Internet of Things, refers to the connection of everyday objects, or “things,” to the internet, allowing them to collect, transmit, and share data. This interconnected network of devices transforms previously “dumb” objects, such as toasters or security cameras, into smart devices that can interact with each other and their

Read more

The IoT Adoption Boom – Everything You Need to Know

Posted on: September 28, 2022

In an age when we seem to go through technology boom after technology boom, it’s hard to imagine one sticking out. However, IoT adoption, or the Internet of Things adoption, is leading the charge to dominate the next decade’s discussion around business IT. Below, we’ll discuss the current boom, what’s driving it, where it’s going,

Read more

9 IoT applications that will change everything

Posted on: September 1, 2021

Whether you are a future-minded CEO, tech-driven CEO or IT leader, you’ve come across the term IoT before. It’s often used alongside superlatives regarding how it will revolutionize the way you work, play, and live. But is it just another buzzword, or is it the as-promised technological holy grail? The truth is that Internet of

Read more

Which IoT Platform 2021? IoT Now Enterprise Buyers’ Guide

Posted on: August 30, 2021

There are several different parts in a complete IoT solution, all of which must work together to get the result needed, write IoT Now Enterprise Buyers’ Guide – Which IoT Platform 2021? authors Robin Duke-Woolley, the CEO and Bill Ingle, a senior analyst, at Beecham Research. Figure 1 shows these parts and, although not all

Read more

CAT-M1 vs NB-IoT – examining the real differences

Posted on: June 21, 2021

As industry players look to provide the next generation of IoT connectivity, two different standards have emerged under release 13 of 3GPP – CAT-M1 and NB-IoT.

Read more

IoT and home automation: What does the future hold?

Posted on: June 10, 2020

Once a dream, home automation using iot is slowly but steadily becoming a part of daily lives around the world. In fact, it is believed that the global market for smart home automation will reach $40 billion by 2020.

Read more

5 challenges still facing the Internet of Things

Posted on: June 3, 2020

The Internet of Things (IoT) has quickly become a huge part of how people live, communicate and do business. All around the world, web-enabled devices are turning our world into a more switched-on place to live.

Read more