SlideShare a Scribd company logo
1 of 5
Download to read offline
Security concerns still hinder IoT strategies, but
advanced adopters are getting to grips with the
necessary techniques and capabilities
The Economist Intelligence Unit’s Internet of Things (IoT) Business
Index 2020, sponsored by Arm, reveals that IoT adoption has progressed
significantly since 2017, both in companies’ internal operations and
in their products and services. But this progress has come in spite of
lingering security concerns.
Of the 825 executives surveyed for the study, 45% agree that security
and privacy concerns have diminished consumer interest in IoT
products. And 13% strongly agree that these concerns have discouraged
their companies from pursuing an IoT strategy.
This no doubt reflects a string of IoT security breaches that have made
the headlines. Among the most alarming was the story, reported in
December 2019, of hackers harassing an 8-year-old girl in the US via her
family’s smart security camera.
Evidently, any company that seeks to pursue such a strategy must
reassure both customers and internal stakeholders that doing so will not
jeopardise their security, and that IoT devices and the data they provide
can be trusted.
Fortunately, the IoT Business Index survey also reveals that companies
are developing their security capabilities as they progress with IoT
adoption. This article examines how companies are building these
capabilities and the security issues they face along the way.
The IoT Business
Index survey
reveals that
companies are
developing
their security
capabilities as
they progress
withIoTadoption Sponsored by:
© The Economist Intelligence Unit Limited 2020
The IoT Business Index 2020:
Securing IoT
2
Many manufacturers are guilty of “basic
violations of good security hygiene” such as
setting the default admin passcode to “1234”
and not requiring the user to change it, Ms
Westerhof says.
Adversaries are often able to hack IoT devices
due to misconfigurations, a lack of passwords
or default credentials. The biggest issue is
misconfigurations, says Mr Taylor. He cites
the example of the Mirai botnet, a network
of compromised IoT devices that hackers used
to launch denial of service (DDoS) attacks.
“Attackers just tried a couple of credentials
and the volume of devices targeted was so big,
it worked.”
IoT security concerns
Much of the complexity of securing the IoT
derives from the computational constraints
of connected devices. This means that
conventional approaches to security
management may not apply, says Katrina
Westerhof, research director at Lux Research.
“IoT security products are, in many cases,
inspired by solutions used in the information
technology (IT) world, but they’re not the
same,” she explains. “IoT devices are often
constrained in processing power, memory,
and battery life, so they can’t support
computationally-intensive cryptography or
hold databases of malware signatures like a
desktop computer can.”
Another issue, says Quentyn Taylor, director
of information security at Canon, is that
IoT devices on a company network can be
forgotten about, adding risk. “That’s when
they can become unpatched, and not
configured by the IT department.”
When it comes to connected products,
security problems may arise when companies
prioritise functionality over security, says Ms
Westerhof. This is not helped by a paucity of
effective network protocols, she adds. “Some
protocols are inherently insecure, prioritising
power savings or other features over security.”
Initiatives such as the UK government’s Secure
by Design, which defines a code of practice for
securing consumer IoT devices, are beginning
to address this. But devices are still hitting the
market plagued by major issues as firms rush
to be first to meet consumer demand.
Approaches to IoT security
The encouraging news from the IoT Business
Index survey is that companies who have
progressed through the IoT maturity curve
have simultaneously developed their security
capabilities. This happens externally at first,
but increasingly within the organisation as
adoption proceeds.
Much of the complexity of
securing the IoT derives from
the computational constraints
of connected devices.
Katrina Westerhof,
research director,
Lux Research
© The Economist Intelligence Unit Limited 2020
The IoT Business Index 2020:
Securing IoT
3
When asked what best describes their
company’s approach to IoT security, those
with the highest level of adoption are more
likely to have developed internal expertise
and resources to ensure its safety (see figure 1).
So how are firms developing their IoT
security? In his experience, Mr Taylor says
companies using IoT within the business
are securing it internally rather than looking
outside for help.
“They are doing standard things and saying,
‘[let’s] treat it all like a computer: understand
where the data needs to go to and from;
who owns the data; who owns the updates;
how long will the device be in situ; what’s
the worst that can happen if it gets hacked?’
Based on the answers to those questions,
[they] then start to say, ‘how do I run this?
How do I want this to work?’”
In general, companies haven’t been as
cautious as they should be when
implementing IoT according to Ms Westerhof.
However, she says some firms—particularly
those who are more mature in their IoT
deployments—enforce stricter security
specifications for their devices.
The rate of growth does not appear to be
slowing down, but experts say companies
should not fear IoT. “It is easy to be afraid of it,
but it’s everywhere and you can’t get away
from it,” says Mr Taylor. “You need to deal
with IoT and say, ‘how can I benefit from it?’.”
Figure 1. The maturity curve
Companies become more self-reliant for IoT security as they advance in adoption
(% of respondents)
Source: The Economist Intelligence Unit.
0
20
40
60
80
100
We do not use the IoT
Our use of IoT presents no security issues
We rely on our technology providers to ensure
the IoT equipment they provide is secure
We rely primarily on specialist external advice
to ensure our use of IoT is secure
We have the internal expertise and resources
required to ensure our use of IoT is secure
ExtensiveEarly implementationIn planningIn researchNon-existent
6
12
6
77
10
27
33
12
18
17
36
32
12
4
29
35
27
7
1
55
25
15
4
1
© The Economist Intelligence Unit Limited 2020
The IoT Business Index 2020:
Securing IoT
4
Securing the internal use of IoT (ie for
internal equipment and processes) requires
a combination of security specifications for
devices, network-level security solutions,
customisation to fill the gaps and a
security culture within the organisation,
Ms Westerhof explains.
But she adds that “the human and cultural
elements” shouldn’t be understated. “Security
isn’t just IT’s responsibility. This is particularly
important in industrial environments, where
IT and operational technology (OT) groups
don’t really speak the same language but are
seeing their worlds collide.”
Securing IoT is certainly a huge task but
firms are well on the way, especially those
operating in high-risk industries. The landscape
is changing rapidly, and Ms Westerhof sees
artificial intelligence (AI) and blockchain soon
playing a role in IoT security. “AI can detect
potential security incidents without knowing
what it’s looking for, and blockchain can help
with security information across a distributed
network of devices.”
About this article
This article accompanies The IoT Business Index 2020: a step change
in adoption, the latest edition of The Economist Intelligence Unit’s ongoing study of the
IoT and its use by businesses. The study, sponsored by Arm, is based on a global,
cross-industry survey of 825 business executives conducted in October 2019.
© The Economist Intelligence Unit Limited 2020
While every effort has been taken to verify the accuracy of this
information, The Economist Intelligence Unit Ltd. cannot accept any
responsibility or liability for reliance by any person on this report or
any of the information, opinions or conclusions set out in this report.
The findings and views expressed in the report do not necessarily
reflect the views of the sponsor.

More Related Content

What's hot

Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...Sudha Jamthe
 
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 enKarel Van Isacker
 
How the Internet of Things Leads to Better, Faster Crisis Communication
 How the Internet of Things Leads to Better, Faster Crisis Communication How the Internet of Things Leads to Better, Faster Crisis Communication
How the Internet of Things Leads to Better, Faster Crisis CommunicationBlackBerry
 
Io t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsIo t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsShyam Goyal
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?BlackBerry
 
Data Protection & Privacy During the Coronavirus Pandemic
Data Protection & Privacy During the Coronavirus PandemicData Protection & Privacy During the Coronavirus Pandemic
Data Protection & Privacy During the Coronavirus PandemicUlf Mattsson
 
An Internet of Things Reference Architecture
An Internet of Things Reference Architecture An Internet of Things Reference Architecture
An Internet of Things Reference Architecture Symantec
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseReadWrite
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) Ahmed Banafa
 
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest MindsWhitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest MindsHappiest Minds Technologies
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715Jim Romeo
 
76 s201918
76 s20191876 s201918
76 s201918IJRAT
 
8 trends of IoT in 2018
8 trends of IoT in 20188 trends of IoT in 2018
8 trends of IoT in 2018Ahmed Banafa
 
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...ijcsit
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesJohn D. Johnson
 
Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
 Revealing the Potential and Risks From the Coming Together of IoT, AI, and C... Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...IndianAppDevelopers
 
Security and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentSecurity and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentDr. Amarjeet Singh
 
IoT, Security & the Path to a Solution
IoT, Security & the Path to a SolutionIoT, Security & the Path to a Solution
IoT, Security & the Path to a SolutionDr Laurent Guiraud
 

What's hot (20)

Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
 
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
 
How the Internet of Things Leads to Better, Faster Crisis Communication
 How the Internet of Things Leads to Better, Faster Crisis Communication How the Internet of Things Leads to Better, Faster Crisis Communication
How the Internet of Things Leads to Better, Faster Crisis Communication
 
Io t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsIo t security_review_blockchain_solutions
Io t security_review_blockchain_solutions
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?
 
IoT in industry
IoT in industryIoT in industry
IoT in industry
 
Data Protection & Privacy During the Coronavirus Pandemic
Data Protection & Privacy During the Coronavirus PandemicData Protection & Privacy During the Coronavirus Pandemic
Data Protection & Privacy During the Coronavirus Pandemic
 
An Internet of Things Reference Architecture
An Internet of Things Reference Architecture An Internet of Things Reference Architecture
An Internet of Things Reference Architecture
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's Enterprise
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference )
 
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest MindsWhitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
 
76 s201918
76 s20191876 s201918
76 s201918
 
8 trends of IoT in 2018
8 trends of IoT in 20188 trends of IoT in 2018
8 trends of IoT in 2018
 
Io t whitepaper_5_15_17
Io t whitepaper_5_15_17Io t whitepaper_5_15_17
Io t whitepaper_5_15_17
 
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected Devices
 
Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
 Revealing the Potential and Risks From the Coming Together of IoT, AI, and C... Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
 
Security and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentSecurity and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT Environment
 
IoT, Security & the Path to a Solution
IoT, Security & the Path to a SolutionIoT, Security & the Path to a Solution
IoT, Security & the Path to a Solution
 

Similar to Io t business-index-2020-securing-iot

Securing the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEOSecuring the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEOThe Economist Media Businesses
 
White Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked SocietyWhite Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked SocietyEricsson
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot securityUsman Anjum
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxtjane3
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxlmelaine
 
5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internetsuperintendingengine17
 
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperKSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperMartin Ruubel
 
New Threats, Existing Remedies, and Unresolved Issues Related to the Effect o...
New Threats, Existing Remedies, and Unresolved Issues Related to the Effect o...New Threats, Existing Remedies, and Unresolved Issues Related to the Effect o...
New Threats, Existing Remedies, and Unresolved Issues Related to the Effect o...ijtsrd
 
Strengthening IoT Security Against Cyber Threats.pdf
Strengthening IoT Security Against Cyber Threats.pdfStrengthening IoT Security Against Cyber Threats.pdf
Strengthening IoT Security Against Cyber Threats.pdfSeasiaInfotech2
 
Security and Privacy challenges of the Internet of Things (IoT) | Sysfore
Security and Privacy challenges of the Internet of Things (IoT) | SysforeSecurity and Privacy challenges of the Internet of Things (IoT) | Sysfore
Security and Privacy challenges of the Internet of Things (IoT) | SysforeSysfore Technologies
 
Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Ulf Mattsson
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxvoversbyobersby
 
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTSECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTvishal dineshkumar soni
 
Security Challenges in IoT Software Development and Possible Solutions.pdf
Security Challenges in IoT Software Development and Possible Solutions.pdfSecurity Challenges in IoT Software Development and Possible Solutions.pdf
Security Challenges in IoT Software Development and Possible Solutions.pdfJPLoft Solutions
 
The Internet of Things (IoT) brings tremendous new capabilities .docx
The Internet of Things (IoT) brings tremendous new capabilities .docxThe Internet of Things (IoT) brings tremendous new capabilities .docx
The Internet of Things (IoT) brings tremendous new capabilities .docxjmindy
 
Telefónica security io_t_final
Telefónica security io_t_finalTelefónica security io_t_final
Telefónica security io_t_finalChristopher Wang
 
IoT Security Why Hiring Skilled Developers is Crucial for Protecting Your Dev...
IoT Security Why Hiring Skilled Developers is Crucial for Protecting Your Dev...IoT Security Why Hiring Skilled Developers is Crucial for Protecting Your Dev...
IoT Security Why Hiring Skilled Developers is Crucial for Protecting Your Dev...Dark Bears
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?Cognizant
 
Internet of Things Challenges and Solutions
Internet of Things Challenges and SolutionsInternet of Things Challenges and Solutions
Internet of Things Challenges and Solutionsijtsrd
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxvrickens
 

Similar to Io t business-index-2020-securing-iot (20)

Securing the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEOSecuring the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEO
 
White Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked SocietyWhite Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked Society
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot security
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet
 
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperKSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
 
New Threats, Existing Remedies, and Unresolved Issues Related to the Effect o...
New Threats, Existing Remedies, and Unresolved Issues Related to the Effect o...New Threats, Existing Remedies, and Unresolved Issues Related to the Effect o...
New Threats, Existing Remedies, and Unresolved Issues Related to the Effect o...
 
Strengthening IoT Security Against Cyber Threats.pdf
Strengthening IoT Security Against Cyber Threats.pdfStrengthening IoT Security Against Cyber Threats.pdf
Strengthening IoT Security Against Cyber Threats.pdf
 
Security and Privacy challenges of the Internet of Things (IoT) | Sysfore
Security and Privacy challenges of the Internet of Things (IoT) | SysforeSecurity and Privacy challenges of the Internet of Things (IoT) | Sysfore
Security and Privacy challenges of the Internet of Things (IoT) | Sysfore
 
Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTSECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
 
Security Challenges in IoT Software Development and Possible Solutions.pdf
Security Challenges in IoT Software Development and Possible Solutions.pdfSecurity Challenges in IoT Software Development and Possible Solutions.pdf
Security Challenges in IoT Software Development and Possible Solutions.pdf
 
The Internet of Things (IoT) brings tremendous new capabilities .docx
The Internet of Things (IoT) brings tremendous new capabilities .docxThe Internet of Things (IoT) brings tremendous new capabilities .docx
The Internet of Things (IoT) brings tremendous new capabilities .docx
 
Telefónica security io_t_final
Telefónica security io_t_finalTelefónica security io_t_final
Telefónica security io_t_final
 
IoT Security Why Hiring Skilled Developers is Crucial for Protecting Your Dev...
IoT Security Why Hiring Skilled Developers is Crucial for Protecting Your Dev...IoT Security Why Hiring Skilled Developers is Crucial for Protecting Your Dev...
IoT Security Why Hiring Skilled Developers is Crucial for Protecting Your Dev...
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?
 
Internet of Things Challenges and Solutions
Internet of Things Challenges and SolutionsInternet of Things Challenges and Solutions
Internet of Things Challenges and Solutions
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
 

Recently uploaded

HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 

Recently uploaded (20)

young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 

Io t business-index-2020-securing-iot

  • 1. Security concerns still hinder IoT strategies, but advanced adopters are getting to grips with the necessary techniques and capabilities The Economist Intelligence Unit’s Internet of Things (IoT) Business Index 2020, sponsored by Arm, reveals that IoT adoption has progressed significantly since 2017, both in companies’ internal operations and in their products and services. But this progress has come in spite of lingering security concerns. Of the 825 executives surveyed for the study, 45% agree that security and privacy concerns have diminished consumer interest in IoT products. And 13% strongly agree that these concerns have discouraged their companies from pursuing an IoT strategy. This no doubt reflects a string of IoT security breaches that have made the headlines. Among the most alarming was the story, reported in December 2019, of hackers harassing an 8-year-old girl in the US via her family’s smart security camera. Evidently, any company that seeks to pursue such a strategy must reassure both customers and internal stakeholders that doing so will not jeopardise their security, and that IoT devices and the data they provide can be trusted. Fortunately, the IoT Business Index survey also reveals that companies are developing their security capabilities as they progress with IoT adoption. This article examines how companies are building these capabilities and the security issues they face along the way. The IoT Business Index survey reveals that companies are developing their security capabilities as they progress withIoTadoption Sponsored by:
  • 2. © The Economist Intelligence Unit Limited 2020 The IoT Business Index 2020: Securing IoT 2 Many manufacturers are guilty of “basic violations of good security hygiene” such as setting the default admin passcode to “1234” and not requiring the user to change it, Ms Westerhof says. Adversaries are often able to hack IoT devices due to misconfigurations, a lack of passwords or default credentials. The biggest issue is misconfigurations, says Mr Taylor. He cites the example of the Mirai botnet, a network of compromised IoT devices that hackers used to launch denial of service (DDoS) attacks. “Attackers just tried a couple of credentials and the volume of devices targeted was so big, it worked.” IoT security concerns Much of the complexity of securing the IoT derives from the computational constraints of connected devices. This means that conventional approaches to security management may not apply, says Katrina Westerhof, research director at Lux Research. “IoT security products are, in many cases, inspired by solutions used in the information technology (IT) world, but they’re not the same,” she explains. “IoT devices are often constrained in processing power, memory, and battery life, so they can’t support computationally-intensive cryptography or hold databases of malware signatures like a desktop computer can.” Another issue, says Quentyn Taylor, director of information security at Canon, is that IoT devices on a company network can be forgotten about, adding risk. “That’s when they can become unpatched, and not configured by the IT department.” When it comes to connected products, security problems may arise when companies prioritise functionality over security, says Ms Westerhof. This is not helped by a paucity of effective network protocols, she adds. “Some protocols are inherently insecure, prioritising power savings or other features over security.” Initiatives such as the UK government’s Secure by Design, which defines a code of practice for securing consumer IoT devices, are beginning to address this. But devices are still hitting the market plagued by major issues as firms rush to be first to meet consumer demand. Approaches to IoT security The encouraging news from the IoT Business Index survey is that companies who have progressed through the IoT maturity curve have simultaneously developed their security capabilities. This happens externally at first, but increasingly within the organisation as adoption proceeds. Much of the complexity of securing the IoT derives from the computational constraints of connected devices. Katrina Westerhof, research director, Lux Research
  • 3. © The Economist Intelligence Unit Limited 2020 The IoT Business Index 2020: Securing IoT 3 When asked what best describes their company’s approach to IoT security, those with the highest level of adoption are more likely to have developed internal expertise and resources to ensure its safety (see figure 1). So how are firms developing their IoT security? In his experience, Mr Taylor says companies using IoT within the business are securing it internally rather than looking outside for help. “They are doing standard things and saying, ‘[let’s] treat it all like a computer: understand where the data needs to go to and from; who owns the data; who owns the updates; how long will the device be in situ; what’s the worst that can happen if it gets hacked?’ Based on the answers to those questions, [they] then start to say, ‘how do I run this? How do I want this to work?’” In general, companies haven’t been as cautious as they should be when implementing IoT according to Ms Westerhof. However, she says some firms—particularly those who are more mature in their IoT deployments—enforce stricter security specifications for their devices. The rate of growth does not appear to be slowing down, but experts say companies should not fear IoT. “It is easy to be afraid of it, but it’s everywhere and you can’t get away from it,” says Mr Taylor. “You need to deal with IoT and say, ‘how can I benefit from it?’.” Figure 1. The maturity curve Companies become more self-reliant for IoT security as they advance in adoption (% of respondents) Source: The Economist Intelligence Unit. 0 20 40 60 80 100 We do not use the IoT Our use of IoT presents no security issues We rely on our technology providers to ensure the IoT equipment they provide is secure We rely primarily on specialist external advice to ensure our use of IoT is secure We have the internal expertise and resources required to ensure our use of IoT is secure ExtensiveEarly implementationIn planningIn researchNon-existent 6 12 6 77 10 27 33 12 18 17 36 32 12 4 29 35 27 7 1 55 25 15 4 1
  • 4. © The Economist Intelligence Unit Limited 2020 The IoT Business Index 2020: Securing IoT 4 Securing the internal use of IoT (ie for internal equipment and processes) requires a combination of security specifications for devices, network-level security solutions, customisation to fill the gaps and a security culture within the organisation, Ms Westerhof explains. But she adds that “the human and cultural elements” shouldn’t be understated. “Security isn’t just IT’s responsibility. This is particularly important in industrial environments, where IT and operational technology (OT) groups don’t really speak the same language but are seeing their worlds collide.” Securing IoT is certainly a huge task but firms are well on the way, especially those operating in high-risk industries. The landscape is changing rapidly, and Ms Westerhof sees artificial intelligence (AI) and blockchain soon playing a role in IoT security. “AI can detect potential security incidents without knowing what it’s looking for, and blockchain can help with security information across a distributed network of devices.” About this article This article accompanies The IoT Business Index 2020: a step change in adoption, the latest edition of The Economist Intelligence Unit’s ongoing study of the IoT and its use by businesses. The study, sponsored by Arm, is based on a global, cross-industry survey of 825 business executives conducted in October 2019.
  • 5. © The Economist Intelligence Unit Limited 2020 While every effort has been taken to verify the accuracy of this information, The Economist Intelligence Unit Ltd. cannot accept any responsibility or liability for reliance by any person on this report or any of the information, opinions or conclusions set out in this report. The findings and views expressed in the report do not necessarily reflect the views of the sponsor.