Businesses Need to Get Serious When It Comes to IoT Security

Nathan Sykes Nathan Sykes
February 15, 2019 IoT & Automation

Ready to learn Internet of Things? Browse courses like Cyber Security for the IoT developed by industry thought leaders and Experfy in Harvard Innovation Lab. 

The emergence of IoT or the Internet of Things introduced plenty of new opportunities for businesses everywhere. Suddenly, you can connect just about anything to tap into advanced analytics, more concise data and actionable insights. Unfortunately, it turns out that linking everything up to the open internet and public networks — even devices that traditionally wouldn’t be — causes quite a bit of fuss for cybersecurity.

For an enterprise, especially, the more IoT and connected devices that tap into a network translates to fewer controls. It’s difficult to identify the devices connecting to the network, which makes it even harder to discern what users or apps do with them.

How Serious Is the Problem?

A Forrester Consulting survey reveals how unprepared modern businesses are to deal with this problem. Out of 603 IT and line-of-business decision-makers involved with cybersecurity teams, 82 percent of companies say they are not confident they can pass audits simply because they cannot identify all IoT or OT devices connected to their network(s). And it’s not just companies in the U.S. either — the survey included those from Australia, New Zealand, France, UK and Germany.

It’s a vast and remarkably widespread problem that touches on the entire business and enterprise sector as a whole. B2B, ecommerce and conventional retail companies are included in the adoption of IoT as well. Brick-and-mortar retailers, for example, utilize IoT to improve their stores and offer more streamlined services for consumers.

The survey also went on to ask who should be responsible for the security of said untamed and unidentified devices. None of the respondents had a clear answer or solution — IoT is essentially the Wild West of modern technology.

To protect a network and the flows of data — incoming or outgoing — an IT and security team must have precise details about who and what enters the network. When coupled with BYOD environments, it becomes even more important.

Many security tools allow for and require proper identification so malicious parties and devices can either be blocked or removed from the network entirely. This stops unauthorized intrusions, potential data breaches and worse from occurring over an extended period of time. Furthermore, it’s vital to regaining a foothold and control over the network in the event of a major attack.

What’s the Solution?

There’s no single or straightforward answer for solving the major security issues with IoT, but that doesn’t mean it’s impossible to achieve.

To start, we need to focus on improving the security for IoT altogether. Many devices — especially portable — have lax security in place which makes them ripe for the picking. The more vulnerable the device, the more likely bad actors will target it. This lies outside the scope of enterprise and business IT teams, however. It’s more of a responsibility for the entire technology industry and device manufacturers to handle. Still, it’s something that needs doing, even to help protect consumer data too.

As for device discovery and identification, automation and sophisticated machine learning algorithms are the most approachable answers. Manually vetting and registering the details of every device that connects to the network is not just tedious, it’s impossible even for the largest of IT support teams. It only makes sense to automate the process, but it can be improved to pick up on unauthorized parties and devices. This can effectively be referred to as dynamic IoT device discovery and profiling. But for it to work, you need a real-time monitoring and data processing system in place, which is no small feat.

The system must review not just the users and devices, but what they do after accessing the network, where they go, how often they connect — or how long they stay — and whether or not they remain within the boundaries of their permissions. Using this information, it must then take action and send alerts to IT professionals for review.

Someone unauthorized, for instance, tapping into a portion of the network and attempting to access encrypted, sensitive data they shouldn’t view must be restricted or blocked entirely. And the system should have the knowledge and ability to do this as soon as it discovers a problem, no questions asked.

The good news is that many tools like this exist, and are continuously updated and improved to become more precise, reliable and efficient.

As for you — a business owner, executive, or IT professional working in the industry — it’s time you get serious about the problem and come up with some ways to bolster your own security before IoT becomes Pandora’s box. Deploying a real-time monitoring solution with the backup of a machine learning or AI platform is a great start.

  • Experfy Insights

    Top articles, research, podcasts, webinars and more delivered to you monthly.

  • Nathan Sykes

    Tags
    Internet of Things
    © 2021, Experfy Inc. All rights reserved.
    Leave a Comment
    Next Post
    The 2018 Sales Technology Landscape: Your Go-To Sales Tech Guide

    The 2018 Sales Technology Landscape: Your Go-To Sales Tech Guide

    Leave a Reply Cancel reply

    Your email address will not be published. Required fields are marked *

    More in IoT & Automation
    IoT & Automation
    Could the IoT Help End Hunger? Farmers Are Finding Out

    Internet of Things (IoT) gadgets are everywhere. Cars, buildings, roadways, airplanes, home appliances, and other items have tens of billions of sensors, processors, and internet-connected gadgets. IoT devices detect motion, regulate temperature, share and collect data, measure weather, and provide location information, power logistics, and medical research. They also enable self-driving vehicles, to name just

    5 MINUTES READ Continue Reading »
    IoT & Automation
    10 Biggest Opportunities for IoT Innovation in 2021

    IoT is a powerful economic driver. IoT Innovation is actively shaping businesses and consumer trends. Most of the technologies developed before and during the pandemic address the Internet of Things directly or indirectly. From healthcare and retail to automobile and manufacturing, IoT innovations are opening new avenues across industries.  It covers almost every segment of

    8 MINUTES READ Continue Reading »
    IoT & Automation
    10 Things to Consider When Starting an IoT Project

    One of the biggest issues companies face when starting an IoT project is deciding who should be responsible. Should it be the engineering team that is responsible for the core technicalities of the device, or should it be the product management team that is responsible for the end functionalities of the IoT product? Starting on

    8 MINUTES READ Continue Reading »

    About Us

    Incubated in Harvard Innovation Lab, Experfy specializes in pipelining and deploying the world's best AI and engineering talent at breakneck speed, with exceptional focus on quality and compliance. Enterprises and governments also leverage our award-winning SaaS platform to build their own customized future of work solutions such as talent clouds.

    Join Us At

    Contact Us

    1700 West Park Drive, Suite 190
    Westborough, MA 01581

    Email: [email protected]

    Toll Free: (844) EXPERFY or
    (844) 397-3739

    © 2025, Experfy Inc. All rights reserved.