‘Cyber Security Awareness month’ comes to a close, but don’t let your M2M guard down

According to a report from the United States Government Accountability Office, The U.S. Computer Emergency Readiness Team reported a 782% increase in cyber incidents from 2006-2012. As this number increases cyber security companies are coming under pressure to create products and tools that not only defend against potential threats, but also assist recovery where an incident occurs.

Cyber security companies exist to mitigate the risk of a cyber breach and mitigate the harm that one could cause, says Jeremy Cowan.  If you’re not in that industry you may not have known it, but October is now also known as Cyber Security Awareness month (I wasn’t aware of that, and for once this is a month that hasn’t been re-designated by the greetings card industry.)

This is a serious subject though, and becoming ever more so as cyber security breaches can happen to anyone at anytime. It could be you that suffers, or your family, your doctor, your college, the stores you shop in, the websites you visit, and even the utilities and agencies that meet basic needs like water and electricity.

The infographic below depicts some of the most infamous occurrences over the last decade and how they’ve affected the global cyber landscape. Thank you to SRC Cyber of New York who sent us the infographic below to show what can be done; besides promoting SRC it contains some interesting data so we thought we’d share it with you. Other cyber security protection companies are of course available, and M2M Now will continue to keep a watch on how this industry as a whole is protecting the Internet of Things and users of connected devices.

1 2014 Cost of Data Breach Study: Global Analysis, Benchmark research sponsored by IBM, conducted by Ponemon Institute LLC, May 2014
2 The “No Network is 100% Secure” series – The Aurora Power Grid Vulnerability – A White Paper, Easyrider LAN Pro, Mar. 2009
3 “June Hack of Washington Post Netted 1.27M User Account Details,” Damon Poeter, PC Magazine, July 2011
4 “Target’s Data Breach Gets Worse,” Sarah Perez, Tech Crunch, Jan. 2014


9 IoT applications that will change everything

Posted on: September 1, 2021

Whether you are a future-minded CEO, tech-driven CEO or IT leader, you’ve come across the term IoT before. It’s often used alongside superlatives regarding how it will revolutionize the way you work, play, and live. But is it just another buzzword, or is it the as-promised technological holy grail? The truth is that Internet of

Read more

Which IoT Platform 2021? IoT Now Enterprise Buyers’ Guide

Posted on: August 30, 2021

There are several different parts in a complete IoT solution, all of which must work together to get the result needed, write IoT Now Enterprise Buyers’ Guide – Which IoT Platform 2021? authors Robin Duke-Woolley, the CEO and Bill Ingle, a senior analyst, at Beecham Research. Figure 1 shows these parts and, although not all

Read more

CAT-M1 vs NB-IoT – examining the real differences

Posted on: June 21, 2021

As industry players look to provide the next generation of IoT connectivity, two different standards have emerged under release 13 of 3GPP – CAT-M1 and NB-IoT.

Read more

IoT and home automation: What does the future hold?

Posted on: June 10, 2020

Once a dream, iot home automation is slowly but steadily becoming a part of daily lives around the world. In fact, it is believed that the global market for smart home automation will reach $40 billion by 2020.

Read more

Silicon Labs brings AI and Machine Learning to the edge with matter-ready platform

Posted on: January 24, 2022

AUSTIN, TX. 24 January 2022 – Silicon Labs, a specialist in secure, intelligent wireless technology for a more connected world, announced the BG24 and MG24 families of 2.4 GHz wireless SoCs for Bluetooth and Multiple-protocol operations, respectively, and a new software toolkit. This new co-optimised hardware and software platform will help bring AI/ML applications and

Read more

The chaos of legacy equipment

Posted on: January 24, 2022

Legacy equipment is vital to the functioning of many manufacturing facilities. Nevertheless, with rapid advancement in automated and connected technologies, managing both new and old equipment simultaneously can be a challenging balancing act. Here Johan Jonzon, CMO and co-founder specialist in edge analytics for the industrial Internet of Things (IIoT), Crosser, shares insight into how

Read more