Security Architecture, Endpoint/Device Security, IoT, Security Strategy, Plan, Budget, Incident Response, TDR, Endpoint/Device Security, Endpoint/Device Security, Endpoint/Device Security

The Internet of Things (IoT) will fail if security has no context

The Internet of Things (IoT) has everyone giddy. You can record shows with your phone that you forgot to set on your DVR before you left the house. You can unlock your house without a key or turn on your lights before you get home. You can turn on the heater remotely so it's nice and toasty before you step in the door. Much more is to come; there's buzz about the connected car, healthcare devices, and the endless possibilities. Analysts at IDC predict IoT spending will exceed $7.3 trillion by 2017. While all this is great for improving the consumer experience, a dark shadow lurks behind it all: concerns about privacy and security. 

It's no surprise that the IoT is leading to a new category of cybercrime. The smart LED light bulbs that leaked Wi-Fi passwords are a recent example. What does a hack of such a device mean? We haven't seen one with devastating consequences — yet. But even relatively minor hacks can cause inconvenience for the user. Worse, these vulnerabilities break the customers' trust and tarnish a company's brand reputation, which can irreparably damage its business.

Identifying who's who and what's what has never been so complex. It's not just about protecting IoT devices but the entire ecosystem, from the customer to the partner, the web page, mobile device, mobile app, the cloud and everything else in between. Static and portable devices need to communicate with each other and human-to-machine and machine-to-machine identification and interaction must be taken into account. Without the right model in place, your organization could be at risk of making your data—and your customers'—openly available to cyber attacks.

The IoT requires a new way of thinking and acting, one that will protect a business and help it grow.  To ensure security in the era of IoT, I'd recommend organizations consider the following:

Think security: IT needs to authenticate customers outside the firewall. Users may want to access systems via multiple devices, and they will expect a user experience that is tailored to how, when, and where they access services.

Think ecosystem: Trying to duct-tape security architecture together or protect access on a device-by-device basis is not going to work effectively—or even at all. A single platform that unifies the entire ecosystem will provide a simple, repeatable way to protect a growing number of devices.

Think flexibility: Building a platform that supports and unifies the entire ecosystem is challenging enough, but you also need to keep the future in mind. Businesses need to support new services, new devices, and new infrastructure on the back end. Open source gives IT a platform it can build on and customize, while open standards offer the flexibility to adapt to future needs in a very standardized manner.

Think monetization: How do enterprises protect data they can't see as it's communicated between IoT devices and other parts of the ecosystem? Ensuring data is encrypted and authenticated is important. However, it's also important to understand the relationship between different parts of the ecosystem. Knowing who accesses data and how, where, and when they access it are just a few of the factors that can help ensure proper security. This knowledge helps you verify the user is legitimate and that current behavior is consistent with past behavior. Because organizations collect all this information, businesses now have a platform they can leverage to better understand and serve the needs of their customers and to provide up-sell opportunities that generate new revenue streams.

Savvy organizations will go to great lengths to protect their customers. We've all seen the negative impact mega data-breaches have on organizations. Being smart about security not only helps the CEO keep his or her job, it helps to protect the brand and provides an opportunity to turn the cost of IoT security on its head by using it to provide new and valuable avenues for future growth. Isn't that what the board really wants in the first place?  According to a recent Gartner report, CEOs list growth among their top three business priorities and are investing heavily in their digital businesses to achieve this goal. IoT will surely play a significant role in achieving this growth, but if it is implemented without proper security, CEOs will fail before they have a chance to succeed.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.