Ensuring Security in the IoT era
Under the IoT umbrella comes a huge range of interconnected devices and applications, ranging from CCTV to IP connectivity to wearables that accumulate and generate cascades of data. Although IoT devices have improved connectivity to a great extent, the unavoidable question that persists is—why and how IoT poses security concerns for individuals and enterprises alike? With the sheer amount of data at disposal, IoT devices provide an easy entry for data intruders and hackers. Owing to the connectivity of these devices to the internet, the impact of a compromised appliance can prove detrimental to users’ privacy. While large-scale enterprises and safety-critical systems often have the resources—security experts and capital—to fortify their IoT devices, even something as simple and cost-effective as a smart refrigerator can be hacked into by malicious bad actors. Even if the data from IoT tools are in the cloud, the prospect of hackers gaining access to that data must be considered.
IoT devices such as smartphones, tablets, watches, and even heating systems are often easily accessible and vulnerable that can enable access to the IoT network. For instance, PIN code phishing could provide access to a device that contains an app, which is connected to the IoT system. Ensuring efficient data security and data access to only authorized users are imperative to avert data intrusions. Security codes must be well protected and discreet. Any code alteration must be detected instantly and should be permitted to only authenticated users. Moreover, it’s essential to determine if the connected devices are authentic and inspect if their critical functionality tampers. Thus, strong authentication and cryptographic key protection are key to securing IoT devices and the data that they aggregate.
By Linda H. Butler, VP of Medical Affairs/CMO/CMIO, Rex...
By Laura Cruz, Global CIO, MDC Partners
By Greg Morrison, SVP & CIO, Cox Enterprises
By Lowell Gilvin, Chief Process Officer, Jabil
By Joe LaFeir, SVP, IS&S (Information Systems & Solutions),...
By Gerri Martin-Flickinger, CIO, Adobe Systems
By Aaron Weis, VP & CIO, Axalta Coating Systems
By Levon Hooks, CIO-Global Corporate Solutions, JLL
By Steve Bein, VP-GIS, Michael Baker International
By Sam Schoelen, Chief Information Technology Officer,...
By Georgios Kyriakopoulos, VP of Equity Research, SunTrust...
By David Sliter, VP & GM of Communications, Media &...
By Julie Stafford, SVP Strategic Consulting, Tangoe
By Dan Adam, CIO, Extreme Networks
By Scott Craig, Vice President of Product Marketing, Lexmark...
By Aaron Gette, CIO, The Bay Club Company
By Dr. Volker G. Hildebrand, Global VP, SAP Hybris
By Meerah Rajavel, CIO, Forcepoint
By Philip Loftus, SVP IT & CIO, SSM Health
By Christy Hartner, SVP, Commerce Bank