Some Things Never Change—Security and the Internet of Things

There’s certainly been a lot of hype over the past few years about the Internet of Things (IoT); its potential to create a 360 view of data has many business analysts salivating. This is an appealing prospect, especially given the network effect gained from more and more enterprises and even households adopting interconnected devices. That said, before every company rushes to adopt this new technology, security concerns must be addressed first.

The problem lies in the lax security standards that most of these devices have. In an age where most individuals feel comfortable making transactions online, we think nothing of sending personal information through the web. The reason for this perhaps undue confidence in security measures is because small breaches are never newsworthy, whereas large breaches attract attention and are generally perceived as isolated incidents.

The truth is, many manufacturers, particularly those constructing IoT devices, know very little outside of the bare basics of cyber security, exposing countless sensors to potential attack. Also problematic is the lack of standards associated with devices under the overall umbrella of IoT.

One example of a problematic tendency is a lack of prompts to change passwords. Manufacturers seldom ask users to change login information from the default, and as a result, devices can be hacked en masse because few have bothered to update their information.

Of course, given how extensive these networks of devices can be, updated security may very well entail securing every single device, a process that is just as excruciating as it sounds. This is a new concern for companies that, until now, have managed to get by with a standard-issue IT department.

Until industry standards can be adopted, it becomes the responsibility of individual businesses to thoroughly vet where their devices are coming from, and study the results of previous companies that have used them. Wonderfully enough, the data is definitely there; though it may require some effort to find and interpret.

There is good news, though. As far as protecting devices goes, there are already proven tactics that IT departments can use to stay on top of things. Encryption, two-factor authentication, and vulnerability scanning can go a long way in ensuring that a company’s web communications are functional and secure.

Problematically, this issue works both ways; devices are being compromised by poor security which are in turn being used in DDOS attacks, two problems that companies will have to worry about.

As far as the defense side of things go, companies do have options in the form of DDOS detectors, as well as numerous websites detailing ways to combat these attacks and similar cyber threats. Companies will need to incorporate contingency plans into their policies for cyberattacks regardless of whether or not they make heavy use of IoT devices.

This may require spending some money to properly train your IT department in defensive best practices, but it’s worth it in the long run. The age of the IoT gives companies an ultimatum: adapt to the shifts in technology, or fall behind. That doesn’t necessarily mean completely integrating new gadgets into your workplace; just to familiarize your company with them and be prepared to incorporate them if your situation calls for it.

Caution is the name of the game. The issue with learning the technology is that it will inevitably change in the next few years. That said, it’s always worth investigating in order to stay on top of recent trends and even leverage new devices to gain a competitive advantage.

Because of these ongoing issues, IoT technology has not been widely adopted, despite the impact that it has already made. These security concerns will have to be addressed before businesses are willing to trust these devices, though, like the Internet before it, it has the potential to revolutionize business and bring a new level of data analysis to the workplace.

Three Ways to Maximize Business Value with IoT

Three Ways to Maximize Business Value with IoT by Scott Maurice

The MIT Sloan Management Review recently released an extremely comprehensive report on IoT drawn from conversations with 1,480 businesses, managers, executive and IT insiders. The report includes a treasure trove of data, opinions, and advice. One thing that jumped out to me while parsing through the report are several statistically backed ways that companies can leverage IoT to increase business value.

Analytics

With the far-reaching data-mining capabilities of IoT, companies can easily find themselves overwhelmed with data. For instance, GE is reported to have “50 million data variables from 10 million sensors”. That’s A LOT of data. With a seemingly infinite amounts of data at hand, the question turns from how much data you have to how well you can analyze it. According to the report, companies with a strong analytics foundation are three times more likely to get value from IoT than those without. That increased value comes in the improved efficacy of projects and in knowing which projects are worth investing in. A staggering 45% of respondents with “good or excellent” analytics can accurately estimate returns on investments, while 19% of companies without good or excellent analytics expertise could. The key takeaway: Sound analytics is key to maximizing value from IoT. With 49% of companies still lagging behind in analytics capabilities, there’s still a lot of room for improvement.

IoT Analytics by MIT Sloan Management Review

IoT Analytics by MIT Sloan Management Review

Talent

Given that IoT is cutting edge technology, it requires talent that is specifically trained in how to handle it. Many businesses realize this. According to the report, 49% of respondents indicated that they need to improve their IoT talent base in order to best leverage IoT technology. Making sure that your company hires IoT is the most straightforward way grow an IoT knowledge base, but it’s not the only one. More than a third of respondents make use of a consulting service and over 40% partner with other organizations that are using IoT. Along these lines, companies can benefit from building relationships with companies that are providing IoT devices. Just like it helps to learn from the mechanic when you bring your car in to get repaired, it helps to learn from your IoT designers.

IoT Talent by MIT Sloan Management Review

IoT Talent by MIT Sloan Management Review

Sharing Data

According to the older paradigm of business, the last thing a company should do is share its data with others. After all, direct competitors may use that data against them and what interest could customers possibly find from data? Now, not only are more and more companies sharing data with customers and suppliers and competitors (66% of respondents in the report), but companies are actually benefitting from increased exchange of information. When companies share data with others, others are more likely to share data with companies. According to the report, the longer a company uses IoT, the more likely it is to share data. What’s more, companies that share data with competitors are more likely to cultivate business value from IoT. The benefit of sharing data is clear.

Data Sharing by MIT Sloan Management Review

Data Sharing by MIT Sloan Management Review

 

Perhaps the greatest takeaway from the report is the emphasis on collaboration. With Analytics, Talent, and Data in general–IoT is pushing companies towards working with one another, making for a more harmonious, and ultimately more innovative market.