Posted on 8/03/2017 by Jay Banghar
In Part ll of the IoT series launched last week, we mentioned the ‘good’ side of IoT within the manufacturing sectors. Just a little recap, I mentioned Cobots alleviating human laborers repetitive mundane tasks.
However in this final part series of IoT, we look at IoT differently on another end of the spectrum – threats/ vulnerabilities of IoT which could potentially “open a can of worms”.
Manufacturers are innovating at an unprecedented rate, integrating cutting- edge technologies in products and automating and connecting the supply chains. While these advancements should position them for future growth, the industry is also likely to experience an increase in cyber threats. Security device with machine learning algorithm detect fraud behavior and isolate the behavior.
IoT and security is significantly important in Singapore’s context. The awareness is here now as compared with a couple of years back when the awareness was less, so security was less of a concern.
I interviewed a candidate who is well versed with the Smart Nation initiatives, and he recently mentioned to me that there are standards shaping up for IoT and security. He shared that from his experiences, he sees that security for IoT is very crucial for Government, Manufacturing, Real Estate and Supply Chain sectors. He quoted an example recently that IoT devices have been used to perform Distributed Denial of Service (DDoS) attacks has happened recently and the hackers brought down an entire university campus backend system as it caused “major traffic flooding” to the website.
For security in the IoT, customers will only show interests after the solution implementation phase. “A lot of customers are beginning to see general interests; I can’t say there are benefits yet. People want to get justification that investing in security IoT gives them a payback, so it is more of finding business use cases to find Return On Investment with validation” says my candidate. It is important to authenticate devices and ensure communication channels are secure perhaps with a private network for IoT to reduce vulnerability. Moving forward, no one would take IoT seriously if there is no security, it can be seen as an entry point of weakness.
While IoT grows in deployment, scale and complexity, proper security methodologies to protect the network and devices and more importantly, the data and insights they extract must also be consistent. “If companies do not take immediate steps to gain visibility and profile the IoT activities within their environment, they run the risk of exposure to potentially malicious activities.”
For instance, Ericsson recently launched successfully a security automation tool to move forward smoothly in terms of IoT and Cloud - Read the article below.
A holistic approach to IoT security strategy, built on strong network access control and policy management, will not only protect enterprises but also simplify the security approach for IT.
So, this concludes the final chapter of the IoT series - you can also see below my first two chapters:
What other interesting or thought provoking issues do you think there are surrounding IoT & Security? Share them with us: +65 6589 8787