Some four years ago hackers entered an unnamed casino’s data network by exploiting IoT devices in a lobby fish tank. Today’s columnist, Ian Ferguson of Lynx Software Technologies, offers advice on how to lock down IoT systems. mrkathika CreativeCommons Credit: CC BY-SA 2.0

The term “the internet of things” was coined by Kevin Ashton in 1999. Some people may argue that the benefits of connecting systems started a long time prior to the late 1990s. The promise of remotely managing systems and gaining quicker real-time insight into – and potentially adjusting the functionality of –equipment has been the subject of many investor pitches.

Of course, hackers can more easily access connected systems and cause mischief, destruction and extortion. As a James Bond fan, I can imagine a remake of the movie Thunderball that involves SPECTRE taking over important data networks as opposed to stealing nuclear bombs. The result could wind up significantly messier in terms of financial impact.

Please register to continue.

Already registered? Log in.

Once you register, you'll receive:

  • News analysis

    The context and insight you need to stay abreast of the most important developments in cybersecurity. CISO and practitioner perspectives; strategy and tactics; solutions and innovation; policy and regulation.

  • Archives

    Unlimited access to nearly 20 years of SC Media industry analysis and news-you-can-use.

  • Daily Newswire

    SC Media’s essential morning briefing for cybersecurity professionals.

  • Learning Express

    One-click access to our extensive program of virtual events, with convenient calendar reminders and ability to earn CISSP credits.