IoT 3 mins read

The future securely belongs to IoT

IoT security is a crucial part of cyber defense. Learn how to protect against cyberattacks and design a strong IoT security plan.

Dr. Juergen Kraemer Dr. Juergen Kraemer

Many people would prefer not to talk about the topic of IoT security. Unfortunately, since attacks on IoT infrastructures are not uncommon, ignoring the subject would be a very bad idea. A variety of studies show that up to 70 percent of those surveyed have information about an attack on their installed IoT. And if that wasn’t concerning enough, more than 80 percent say that they aren’t certain if their IoT is sufficiently secure.

It’s no wonder, then, that we keep on encountering skepticism about IoT security when we talk to customers. Even though top-level managers know they can’t avoid IoT, if they want to stay competitive over the medium-term with their product portfolio, they still fear that they may be opening a new door for attackers from the internet, which may damage their company.

Create resilient revenue with IoT

These fears may even be positive. After all, people handle the things appropriately that they take seriously. Cyberattacks can only be countered if information security is not only an IT issue, but an OT issue as well. To achieve this goal, companies need to make organizational adjustments.

And providers need to take IoT security seriously as well. Security needs to be a key design principle for all IoT assets.

Moreover, I believe that IoT platforms like Cumulocity IoT can contribute a thing or two to IoT security:

  • With an IoT platform that delivers strong device management, those in charge can maintain an overview of all their connected IoT devices.
  • Automatic software distribution for device management allows fast, remote installation of security patches at the click of a button — anywhere in the world for thousands of even hundreds of thousands of connected devices.
  • Since only explicitly registered devices can establish contact with the platform, no unknown devices can sneak into the IoT. In addition, communication between the devices is encrypted.
  • The multi-tenant approach enables granular management of users and rights. That way project supervisors have flexibility to determine who can access the data. With the application management, every tenant can manage their own applications and expand the platform according to their own needs with suitable applications.
  • Remote monitoring of an IoT platform can detect the smallest behavior anomalies in connected devices. This enables compromised assets to be shut down quickly, for instance, to reduce the risk of damage.

How do you see the Internet of Things in the context of security? Is your security department well-positioned for the OT?

Related articles

  • IoT

    IoT in Cybersecurity: Where is the silver bullet?

    For everybody using Cloud-based services, security is a key concern. Each week we learn of another organization that has been successfully hacked, with sensitive corporate or personal data shared with malicious 3rd-parties or leaked to the Dark Web. According to…
    Jane Porter Jane Porter
  • IoT

    IoT: biting the dust or coming of age?

    At some point in life, we need to "get real" with our experimental projects and assess their true value. For businesses, this is typically the decision point at which a strategic investment is turned into a profitable business. With IBM…
    Bernd Gross Bernd Gross
  • IoT

    Building Defense in Depth

    In the first blog of this series, we talked about the fact that a layered approach to security is required to minimize the attack vector. With all the different ways hackers can access sensitive systems, multiple types of solutions need…
    Jane Porter Jane Porter