EBN – The prpl Palette – 4 Security Challenges That Threaten to Tear Apart the Internet of Things
Hojt Communication is a consulting company focused on our clients need to rapidly bring the right product to the right market. We stand out due to our ability to combine skills in strategy, implementation, operations and technology with deep understanding about the connected world and the new levels of security and privacy protection that world brings.
vision,strategy,product,market,business development,marketing,mobility,Internet of Things,IoT,Security
22040
post-template-default,single,single-post,postid-22040,single-format-standard,stockholm-core-1.2.2,select-child-theme-ver-1.0.0,select-theme-ver-5.3,ajax_fade,page_not_loaded,wpb-js-composer js-comp-ver-6.3.0,vc_responsive

EBN – The prpl Palette – 4 Security Challenges That Threaten to Tear Apart the Internet of Things

6657b91d-71ea-4f67-9109-7a600ed3c327.jpg

The Internet of Things is developing at such a rate that it threatens to outstrip our ability to adequately secure it…and that’s potentially a huge problem.

Sourced through Scoop.it from: www.ebnonline.com

First of all, you have to secure the device, tis hardware and firmware. Then you must protect the communication to/from it, by adding an encryption layer. You also need to manage the remote access to the device with strong authentication to prevent any unauthorised access to the device and the data produced. And then you need to protect the accumulated data in hubs and cloud storages, and finally, the access and control will often be through a mobile app on a smartphone, or similar, that also need protection.

And when all this is implemented and actually working there is the time factor in product life cycles. How do you push updates when new vulnerabilities are discovered over the following years? What to do when products are phased out but still used by the customer? As a comparison think about Microsoft’s problem with Windows XP end-of-life.

IoT is a huge security challenge, but fortunately, it’s already been done before. You just have to realize that the small sensor, in fact, is a small computer and that you must adapt all the processes and techniques developed by the computer industry. Learn from the software industry. Recruit their best security experts!

See on Scoop.itApps and Internet of Things