Securing the IoT against cyber attack

Dirk Paessler, CEO of Paessler

The Internet of Things is perhaps the most significant IT revolution of our time in terms of it’s potential to change the way we do everything – from working to shopping.

But as its reach and influence on our lives continues to grow, attention must at some point turn from simply what IoT might be able to do for us, to how do we make sure that it doesn’t let us down.

From a security perspective there are a number of risks associated with migrating existing IT networks and devices on to the IoT, due to the large scale transfer of information that is required providing an ideal environment for cyber criminals, says Dirk Paessler is CEO of Paessler.

In addition, research from the Ponemon Institute, a research organisation focusing on privacy and data protection, found that 94% of risk management professionals believed that a security incident resulting from unsecured IoT devices “could be catastrophic”. This underlines the importance of ensuring high levels of cyber security as the IoT continues to grow, and begs the question of how can we keep it secure whilst also making the most of its undoubted benefits?

A growing threat

Today the threats to a company’s IT are more diverse than ever before. Viruses and Trojans are as big a threat as they have ever been, but beyond this, the proliferation of IoT presents even more opportunities for malware intrusion. IT has to work hard to address these risks; the challenge is to find a balance between new opportunities and greater flexibility on the one hand, and adequate security provision on the other.

However, it is not only malicious attackers that threaten a company’s data. Malfunctions and physical hazards can also present issues. Failures or misconfigured devices and applications, along with fires, floods or extreme heat can put huge pressure on a company’s IT infrastructure and that pressure will only grow with the rapid proliferation of IoT. All of these threats can be kept in check, but the question is how can businesses make sure that everything works in a synchronised way?

Prioritising security

The answer is a comprehensive cyber security strategy that can identify potential hazards, organise appropriate tools for protection and control this with one central solution – a so-called meta-security tool.

An IT monitoring solution is one such tool, allowing businesses to manage all of the various security solutions they use. In the first instance, it allows businesses to monitor the full range of traditional security tools. A comprehensive monitoring solution provides IT teams with this knowledge, and ensures that all of the various parts of an organisation’s infrastructure are functioning properly.

Similarly, it allows businesses to keep an eye on the ‘things’ that make up the IoT, whether that be physical control devices like sensors and video cameras or IoT-enabled industrial machinery, ensuring that all systems operate as expected, and act as an early warning system that notifies the relevant parties if any threats are detected.

Making the difference

Ultimately, IT monitoring enables a company to monitor functionality across all parts of its IT infrastructure, and also acts as a fall back in case conventional security tools fail. But the main benefit of an effective IT monitoring solution is that it provides administrators with clarity, giving them a complete and single overview of the network. This is particularly important in the context of IoT, where devices and other ‘things’ are being added and removed from the network on a regular basis.

With this in mind, when you consider the wide range of threats that can permeate an IT and IoT infrastructure, the question is not if a business should implement an IT monitoring solution but rather if it can afford not to if it wants to remain cyber secure.

The author of this blog is Dirk Paessler is CEO of Paessler

Comment on this article below or via Twitter: @IoTNow OR @jcIoTnow

FEATURED IoT STORIES

9 IoT applications that will change everything

Posted on: September 1, 2021

Whether you are a future-minded CEO, tech-driven CEO or IT leader, you’ve come across the term IoT before. It’s often used alongside superlatives regarding how it will revolutionize the way you work, play, and live. But is it just another buzzword, or is it the as-promised technological holy grail? The truth is that Internet of

Read more

Which IoT Platform 2021? IoT Now Enterprise Buyers’ Guide

Posted on: August 30, 2021

There are several different parts in a complete IoT solution, all of which must work together to get the result needed, write IoT Now Enterprise Buyers’ Guide – Which IoT Platform 2021? authors Robin Duke-Woolley, the CEO and Bill Ingle, a senior analyst, at Beecham Research. Figure 1 shows these parts and, although not all

Read more

CAT-M1 vs NB-IoT – examining the real differences

Posted on: June 21, 2021

As industry players look to provide the next generation of IoT connectivity, two different standards have emerged under release 13 of 3GPP – CAT-M1 and NB-IoT.

Read more

IoT and home automation: What does the future hold?

Posted on: June 10, 2020

Once a dream, iot home automation is slowly but steadily becoming a part of daily lives around the world. In fact, it is believed that the global market for smart home automation will reach $40 billion by 2020.

Read more
RECENT ARTICLES

Snow Software study uncovers the realities vs. the promises of cloud

Posted on: October 26, 2021

26 October, 2021 –Snow Software, the global provider of technology intelligence, unveiled findings from its most recent survey, based on the input from more than 500 IT leaders from organisations with over 500 employees in the United States and United Kingdom to determine the current state of cloud infrastructure.

Read more

CloudM announces Archive feature which save businesses time and money while meeting compliance demands

Posted on: October 26, 2021

CloudM, a SaaS data management platform, has announced the launch of Archive, a new feature which allows users to easily, automatically, and safely store and recover user data, helping businesses to remain compliant without facing the mounting user license fees associated with traditional archiving and ediscovery solutions.

Read more