The Internet of Things (IoT) has become the new frontier of business, and concurrently, is the new frontier of threats. In this first post of a four-part series, I’m covering various angles of Internet of Things (IoT) Security. Whether you’re on the purchasing, sourcing, and finance side, handle IT security and risk management, or you are project- or product-managing an IoT deployment, security is a major piece of the puzzle. Subscribe to our blog to be notified when the next parts drop.
Viewers of the televised Pyeongchang 2018 Winter Olympics’ opening ceremonies on Feb. 9 noticed something strange amidst all the fanfare - a certain quiet eeriness, brought on by thousands of empty seats in the stadium. It wasn’t a lack of interest, poor sales, or even low temperatures that kept seats cold. It was that spectators weren’t able to, well, spectate, due to a cyberattack that gutted the Pyeongchang Olympic Committee and prevented ticket-holders from printing out their reservations to get into the show.
In addition to shutting down the Pyeongchang 2018 website and knocking out Internet access and telecasts, the attack targeted connected Internet of Things (IoT) devices, like broadcaster drones and mesh wifi controllers.
Security in a wired world is tricky for any business, small or large. Adding IoT to the mix brings with it its own set of security considerations, many of them brand new and requiring a different set of skills.
But IoT is the new frontier of threats for a reason: Because it is the new frontier of business.
You can avoid the most common security mistakes in the IoT rush
What do you do to securely launch, maintain, and lockdown your IoT product or solutions? I recently spoke at IoT Evolution 2018 where I shared some of the most important considerations for a successful, secure IoT product launch.
I’ll list them out by typical roles within an organization so you can see how the matter of security affects each facet of an IoT line of business.
- Purchasing, Sourcing, and Finance - How do you evaluate and shop the open marketplace of IoT vendors to find one that will best serve your business and cut costs throughout your entire IoT product lifecycle?
- IT Security and Risk Management - How do you prevent your IoT business from becoming the next entry point for a breach?
- Product and Project Management - How do you build, launch, and maintain thousands of IoT devices that can securely send and receive data?
When it comes to deploying IoT, the opportunities for a security breach increase significantly. Just as in Pyeongchang's eerily empty stadium at its opening ceremonies, your business could see some empty seats if it deploys IoT without considering security within each functional team involved.
In the coming weeks I’ll delve into security from the standpoints I mentioned. Please subscribe to our blog to be notified when those post.
If you already have an IoT line of business or IoT is on your radar, schedule an appointment with me for a free one hour strategy session.