Hype, excitements, risks, threats, benefits and holistic recommendations surrounding the Internet of Things.



Smart thermostat

When it comes to Internet of Things, Connectikpeople.co talks about connected and unified countless objects and systems (Devices and their cloud, network and client application components).

The most exciting with this technology, it is its ability to capture, process and provide critical data and insights we need in real-time to streamline our business and IT operations, improve our living conditions and implement sustainable development.
  
It is encouraging to observe that the rise of IoT, the number and diversity of connected devices is expected to increase exponentially. According to Gartner, “the Internet of Things” will include 26 billion units installed by 2020. IoT product and service suppliers will generate incremental revenue exceeding $300 billion, mostly in services, in 2020.”(1)

It is also exciting to observe that manufacturers are quickly bringing to market connected devices, cloud access capabilities and mobile applications.

But beyond unmatched benefits to consumers, according to certain researchers, the Internet of Things is also the open-door for security threats ranging from software vulnerabilities to denial-of-service (DOS) attacks to weak passwords and cross-site scripting vulnerabilities.

This means it is vital to build security into these products from the beginning to disrupt the adversary and avoid exposing consumers to serious threats.

From smart sensors, manufacturers of TVs, webcams, home thermostats, remote power outlets, sprinkler controllers, hubs for controlling multiple devices, door locks, home alarms, scales and to garage door openers, the most common security issues reported include: Privacy concerns; Insufficient authorization; Lack of transport encryption; Insecure web interface and Inadequate software protection.

Therefore Connectikpeople.co recommends organizations to implement an end-to-end approach to identify software vulnerabilities before they are exploited. Organizations also need the ability to test the security of software quickly, accurately, affordably and proactively eliminating the immediate risk in legacy applications and the systemic risk in application development. The end-to-end encryption is vital. 


(1)   Gartner, “Forecast: The Internet of Things, Worldwide, 2013,” November 2013.

Popular Posts