WORLD NEWS TOMORROW – NETHERLAND – The Internet of Things (IoT) is the interconnection of uniquely identifiable embedded computing devices within the existing Internet infrastructure. Typically, IoT is expected to offer advanced connectivity of devices, systems, and services that goes beyond machine-to-machine communications (M2M) and covers a variety of protocols, domains, and applications. The interconnection of these embedded devices (including smart objects), is expected to usher in automation in nearly all fields, while also enabling advanced applications like a Smart Grid. (Wikipedia)
IoT includes not only human beings but also all the devices including sensors, medical equipment, cars, industrial machines etc. that link to any network that connects to the Internet and exchanges data. For me the term means danger for businesses.
Most experts agree that the IoT needs a new strategy on cybersecurity. The IoT introduce new issues like data sharing on a IoT network. With the IoT large amounts of users and data are involved and with that in place, cybersecurity issues rise. Plus you’re pushing devices with programmer-written software that needs to be connected to the Internet. And we all know where most bugs (and security holes) come from…. exactly, programmer-written software.
Already most companies are still dealing how to securely rollout BYOD and to keep it safe due to the amount of new and strange BYOD devices that are emerging. Now with an added problem of IoT, cybersecurity needs to deal with a bigger amount of ‘legal’ data flowing to everyone while monitoring the illegal activities and data that may occur.
A new strategy means reassessing your risk-management, go through all your security standards again, invite ethical hackers to point out the new gaps in your networks and last but not least: what will this mean for your CORE business?
With your new IoT strategy, you have a better understanding on the amount of allowed and unallowed data shared between you and ‘strange’ networks. You will decide, not the manufacturers, who is the OWNER of the data that is flowing. Since there is not much legislation on data sharing between commercial parties, you need to take your position on this with a strategy, or be taken to court by the other party who already has it.
Before you embrace the IoT, make sure you *cyber* arm your company against these new potential threats in your network.
By Joe Shenouda