Personal data breaches and securing IoT devices
- by 7wData
The Internet of Things (IoT) is taking the world by storm as interconnected devices fill workplaces and homes across the US. While the intention of these devices is always to make our lives easier, their ability to connect to the Internet turns them into ticking time bombs, lying in wait until their weaknesses can be exploited by opportunistic hackers.
Personal data breaches are skyrocketing in America, increasing by 60% in the last year and by 157 percent since 2015. As our interconnectivity grows, so do the opportunities that our technology will be hacked. Since every IoT device is connected to the Internet, each one is vulnerable to external access if not secured properly. In the rush to manufacture these devices and get them onto the market, security has been an afterthought which needs to be urgently addressed if the number of yearly data breaches is to be tackled.
Not only is the actual security of IoT devices under constant debate but recent news stories surrounding both the Amazon Alexa and Google Home products -- central machines to most home IoT set-ups -- show that even when used properly, the security implications of these devices can be suspect.
Though many expect IoT to revolutionize our everyday lives, the potential holes they open up in our security infrastructures could become an insurmountable problem if not dealt with soon.
IoT in the workplace can range from integrated systems such as air conditioning and security systems to Wi-Fi enabled coffee machines. But every point of access in a system has potential for weakness, meaning the more connected devices there are the harder it is to protect. Many believe that blockchain technology has the answer for IoT security issues due to its decentralized nature and the ability to timestamp and identify each connected device, allowing for more accurate access records and a more stable network where no central point is vulnerable.
The other key issue with workplace IoT is the necessity of regular updates to keep all devices secured. In working environments where machines are working 24/7, there is no time to take machines out of service to complete updates, meaning identified weaknesses can be left unresolved. This allows hackers multiple opportunities to exploit the insecurities in an individual device and gain access to the central network from there.
Creators of IoT devices will need to address the concerns of their consumers in order to create products which can be routinely secured and hold a high base standard of security.
[Social9_Share class=”s9-widget-wrapper”]
Upcoming Events
From Text to Value: Pairing Text Analytics and Generative AI
21 May 2024
5 PM CET – 6 PM CET
Read More