Remote - M2M 2015 - (Page 6)

Feature Article Safeguarding the IoT: Putting Security Front and Center Alex Brisbourne, CEO KORE Over the past decade, businesses have taken a risk-based approach to security, balancing the need to keep critical data secure against the risk that a breach of some sort will occur. In many cases, that's still the case. Despite some high-profile breaches against major retailers, healthcare companies and financial institutions, many organizations including those running sensitive industrial applications still aren't protecting their data as well as they could and should. One thing is changing all that: the Internet of Things (IoT). The IoT comprises all of the smart systems and devices that are being connected to the Internet. These include consumer devices, such as home automation devices (thermostats, refrigerators, etc.) and connected vehicles, but also include the growing number of sensors and applications developed for more industrial and B2B uses. These include things like remote monitoring applications for ranching, irrigation systems for agriculture, utility metering and other applications for industries such as construction, mining and oil and gas. Even remote ATMs and machines that collect credit card data, such as automated car washes, fall into this category. In these industries, IoT devices are often located in remote areas where they are not monitored by a human and rely on Internet access to gather the information they are intended to collect. While IoT devices and applications for these industries traditionally fall into the machine-to-machine communications (M2M) category, they're getting increasingly smarter. These devices and sensors are no longer just creating alerts when things go wrong; they're delivering valuable business intelligence to the companies that use them. As such, these systems will increasingly generate a staggering volume of data that businesses will be able to analyze and leverage to improve productivity, protect expensive assets and otherwise cut costs and grow their bottom line. So why is now the tipping point for figuring out ways to better secure these systems? The answer is simple: the volume of connected devices is expected to grow five-fold over the next five years. Cisco Systems estimates that the number of connected systems will grow to 50 billion by 2020, generating $19 trillion in new revenues for businesses worldwide during the next few years. Analysts from IDC expect the IoT technology and services market to reach $8.9 trillion in that same time period. While reality may not reach those lofty numbers for some time, it's clear that we are in for a lot of growth. It's easy to look at the IoT and be awestruck by the promise of increased efficiency and business productivity, especially when systems such as those that control building automation replace manual checks at remote sites. However, there isn't the necessary urgency surrounding the potential security issues that can arise when so many systems are connected via the Internet. More devices and systems online means more devices and systems that need protecting, and IoT systems are not usually designed for cyber security. At the same time, most IT departments are very familiar with protecting laptops, servers and traditional IT infrastructure, and are not equipped to manage a much broader set of interconnected devices and systems. This increased complexity within the enterprise can't be overlooked. Growth is coming, so what are we going to do about it? Any device that connects to the Internet with an operating system can potentially be compromised, opening a backdoor for attackers into your business. Companies will not have the option to take a wait-and-see approach while the industry hammers out a series of standards around IoT security. There are, however, things that businesses can do today to ensure their remote assets are as secure as possible. Before you deploy that next "connected" application, here are five things you need to keep in mind: 1) Make Sure Security is Front and Center - The building blocks of the IoT are billions of tiny sensors, which by their size and nature are limited in terms of being able to support a robust security solution. But that doesn't mean they can be left unprotected; it just means you need to build with security as a priority from the start. By identifying potential threats and discovering solutions early on in the development process, you'll develop a strong precedent that can be followed throughout the application and device lifecycle. 2) Understand How Your Data and Devices are Protected - According to a report from HP Security Research, up to 90 percent of M2M / IoT devices collect personal information. The problem is, most companies only have a basic understanding of how that data is being protected. In many cases, they believe someone else is responsible for securing devices, data, applications and systems. As discussed earlier, securing IoT systems and devices takes an adjusted mindset, and many IT departments don't truly understand how IoT security differs from traditional network security. 6 www.RemoteMagazine.com http://www.RemoteMagazine.com

Table of Contents for the Digital Edition of Remote - M2M 2015

Editor's Choice
Safeguarding the IoT: Putting Security Front and Center
Remote Device Management for the Internet of Things
Not So Remote Any More: Incorporating Wireless Connectivity into Remote Site Equipment for Anytime Access and Greater Control
M2M with HMI
OMG Standards in the Oil & Gas Industry
Internet of Things West Preview
Modern IT Solutions Turn Worry into Confidence
IoT Products and Services
Industry News

Remote - M2M 2015

https://www.nxtbook.com/nxtbooks/webcom/remote_2016winter
https://www.nxtbook.com/nxtbooks/webcom/remote_2016fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2016
https://www.nxtbook.com/nxtbooks/webcom/remote_2016spring
https://www.nxtbook.com/nxtbooks/webcom/remote_2015fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2015m2m
https://www.nxtbook.com/nxtbooks/webcom/remote_2015spring
https://www.nxtbook.com/nxtbooks/webcom/remote_industrialnetworking2014
https://www.nxtbook.com/nxtbooks/webcom/remote_2014fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2014m2m
https://www.nxtbook.com/nxtbooks/webcom/remote_2014spring
https://www.nxtbook.com/nxtbooks/webcom/remote_2013winter
https://www.nxtbook.com/nxtbooks/webcom/remote_2013m2m
https://www.nxtbook.com/nxtbooks/webcom/remote_2013fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2013summer
https://www.nxtbook.com/nxtbooks/webcom/remote_2013spring
https://www.nxtbook.com/nxtbooks/webcom/remote_2012winter
https://www.nxtbook.com/nxtbooks/webcom/remote_2012m2m
https://www.nxtbook.com/nxtbooks/webcom/remote_2012fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2012summer
https://www.nxtbook.com/nxtbooks/webcom/remote_2012scada
https://www.nxtbook.com/nxtbooks/webcom/remote_2012spring
https://www.nxtbook.com/nxtbooks/webcom/remote_201112
https://www.nxtbook.com/nxtbooks/webcom/remote_201110
https://www.nxtbook.com/nxtbooks/webcom/remote_201108
https://www.nxtbookmedia.com