Story image

A/NZ businesses taking IoT security more seriously - MapR

16 Oct 2018

Written by MapR Technologies Australia and New Zealand managing director Scott Hubbard

As more devices become connected in the workplace, the challenge of ensuring enterprise security is vastly increasing. 

The Internet of Things (IoT) is permeating every aspect of the organisation; enabling businesses to drive efficiency and increase revenues, with 67% of large-scale IoT users (those with more than 50,000 connected devices) reporting significant returns on their investment.  

With the number of connected devices expected to reach over 20 billion by 2020, it is inevitable that businesses will struggle to maintain security in the face of such a rapidly expanding attack surface. 

And for those connected devices that are equipped with cameras and microphones, the risk of highly sensitive data being compromised and exploited by cybercriminals is even higher. 

IoT provides businesses with new streams of data to quantify and analyse, delivering key insights that can help increase business value. 

However, it’s crucial that organisations realise the security considerations in managing the vast streams of big data being generated by IoT.  

Education is necessary 

Research shows that most Australian businesses lack concern for the threat cyber attacks can have on connected devices within the enterprise, with only 34% of companies intending to assess IoT risks across their business, while 16.1% don’t know who is responsible for IoT security.  

Meanwhile, there was a 600% increase in attacks on IoT devices from 2016 to 2017, making it imperative that businesses are prepared to protect their connected devices. 

Educating employees on how to detect and prevent data breaches is essential, especially because the majority of data breaches are caused by human error. 

Businesses need to ensure they have a cybersecurity strategy in place that can adequately secure and protect their operations. 

Data security is imperative to any IoT strategy 

While education and awareness of the security risks posed by IoT are currently lacking, the tide of opinion amongst those companies that have already implemented IoT strategies is slowly changing. 

53% of A/NZ companies now believe that keeping IoT secure is the greatest challenge they face in rolling out their IoT capabilities.

Authentication is a key part of this process and will work to prevent malicious actors from accessing business networks early on. 

Authenticating employees and assets onto networks can allow organisations to detect potentially harmful assets or people attempting to breach networks before they have time to access large sets of data.  

Assets such as time-series data transmitted from IoT sensors and structured data within application and database systems are also crucial resources that require significant security.   

Implementing an IoT security plan 

As a bare minimum, organisations should ensure their cybersecurity approach can lock down data security across the cloud, and edge devices – with the appropriate key management and encryption in place. 

With 70% of IoT devices vulnerable to cyber attacks, implementing adequate security software is necessary to protect big data. 

Security mechanisms should efficiently detect anomalies in data, ensuring only legitimate people are accessing data. 

Encryption of data needs to be maintained from the core where most data is stored, and moreover at the fringes, the areas most vulnerable to attack. 

In the event of a data breach, businesses need to ensure their cybersecurity software can detect affected assets swiftly – inevitably limiting revenue loss and avoiding damages to brand reputation. 

The rise of IoT and connected devices has the potential to completely change the way business operations are enhanced.

However, the increased interconnectedness of devices and the growing number of ‘things’ connected to the internet are leaving businesses vulnerable. 

Implementing effective cybersecurity software and strategies is necessary to ensure the big data that is stored within IoT is completely protected.  

Avi Networks: Using visibility to build trust
Visibility, also referred to as observability, is a core tenet of modern application architectures for basic operation, not just for security.
Privacy: The real cost of “free” mobile apps
Sales of location targeted advertising, based on location data provided by apps, is set to reach $30 billion by 2020.
Myth-busting assumptions about identity governance - SailPoint
The identity governance space has evolved and matured over the past 10 years, changing with the world around it.
Forrester names Crowdstrike leader in incident response
The report provides an in-depth evaluation of the top 15 IR service providers across 11 criteria.
Slack doubles down on enterprise key management
EKM adds an extra layer of protection so customers can share conversations, files, and data while still meeting their own risk mitigation requirements.
Security professionals want to return fire – Venafi
Seventy-two percent of professionals surveyed believe nation-states have the right to ‘hack back’ cybercriminals.
Alcatraz AI to replace corporate badges with AI security
The Palo Alto-based startup supposedly leverages facial recognition, 3D sensing, and machine learning to enable secure access control.
Unencrypted Gearbest database leaves over 1.5mil shoppers’ records exposed
Depending on the countries and information requirements, the data could give hackers access to online government portals, banking apps, and health insurance records.