Insurers Are Not Ready For IoT

A new LexisNexis study says insurance companies know IoT is important, but they have no idea how to collect the data or what to do with it.

You might think that the Internet of Things (IoT) was custom made for the insurance industry. After all, what could be more useful to all those actuarial tables than detailed, real-world information from billions of IoT sensors in a wide variety of devices? 

In fact, we’re already seeing the beginnings of insurance uses of IoT, including auto insurance companies giving discounts to drivers who are willing to have their vehicle tracked

But according to a new from LexisNexis, the message hasn’t penetrated very far into the famously conservative field. 
Top-line results from the survey reveal a clear disconnect between what insurance companies think about IoT and what they’re actually doing about it.

IoT in Insurance
On the one hand, the hype around the IoT has had some effect: seven in 10 of the 600 auto, home, life and commercial insurance professionals surveyed said IoT data is important to their company strategy today, and even more believe it will be important over the next five years. Almost half (48 percent) said “the ability to collect and use IoT data will define industry leaders.” That’s great, but given the rest of the results, insurance industry interest in IoT doesn’t seem to run very deep.

As it turns out, only 21 percent of respondents say their companies have an IoT strategy at all. Worse, a minuscule 7 percent say they have the “human and technology resources required” to use IoT to make critical decisions. Even among respondents who actually collect IoT data from “telematics, wearables, connected home and properties,” an embarrassingly low 5 percent use that data in their day-to-day analytics.

If you’re not using IoT in decision-making or analytics, why are you bothering to collect the data in the first place?
Is IoT Tactical instead of Strategic?

According to LexisNexis, “one reason the insurance industry is lagging could be that most carriers think of IoT at a tactical rather than a strategic level. When asked to define IoT, most did so in tactical terms like ‘a network of connected devices.’ Few respondents discussed IoT in terms of strategic uses for underwriting, claims and other analytics.”

The company also cited perceived barriers around “data governance, security concerns, and proprietary … data.”
The real takeaway here isn’t that one particular industry isn’t yet making big use of the Internet of Things, no matter how perfect a fit it may seem. The bigger picture is that this kind of disconnect around IoT is all too common right now across a wide spectrum of industries.

Everyone is “interested” in IoT, but few have any firm idea when or how they’re actually going to implement it or benefit from it.
Going forward it’s time we stop judging IoT by the hype and interest it generates, or even by the number of devices in use. The key now is how are enterprises (and individuals) actually using IoT, and what real-world benefits are they deriving from it.

The LexisNexis study suggests that many insurance organisations may be hanging back, waiting for a more demonstrable set of ROI numbers. Given the overall state of IoT, it is hard to argue with that approach.

Network World: 

You Might Also Read:

IoT Is Becoming A Nightmare For IT:

The Internet of Things Will Be Even More Vulnerable to Cyber Attacks:


 

 

« Preventing Another Wannacry
AI & Machine Learning Are Adding To The Skills Shortage »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BH Consulting

BH Consulting

BH Consulting we are a vendor independent consulting firm providing market leading range of information security services focused on data protection and cybersecurity.

Quttera

Quttera

Quttera provides Website Security Solutions for Small & Medium Businesses, Enterprises and Organizations.

Qualys

Qualys

Qualys is a pioneer and leading provider of cloud security and compliance solutions.

Evok

Evok

EVOK is an IT Service provider specialized in installing, maintaining and supporting IT infrastructures for SMB's in Switzerland.

QASymphony

QASymphony

QASymphony software testing and QA tools help companies create better software by improving speed, efficiency and collaboration during the testing lifecycle.

Entrust

Entrust

Entrust is a global leader in digital security, identities, payments, and data protection.

ISARA Corp

ISARA Corp

ISARA Corporation is a security solutions company specializing in creating class-defining quantum-safe cryptography for today's computing ecosystems.

ECOS Technology

ECOS Technology

ECOS Technology specializes in the development and sale of IT solutions for high-security remote access as well as the management of certificates and smart cards.

Institute of Informatics and Telematics (IIT)

Institute of Informatics and Telematics (IIT)

IIT carries out activities of research, assessment, technology transfer and training in the field of Information and Communication Technologies and of Computational Sciences.

K2 Cyber Security

K2 Cyber Security

K2 Cyber Security delivers the Next Generation Application Workload Protection Platform to secure web applications and container workloads against sophisticated attacks.

TrueFort

TrueFort

TrueFort take an application-first approach that offers comprehensive protection for real-time visibility and analysis, protection and better communication across business, IT, and security teams.

Mandiant

Mandiant

Mandiant deliver dynamic cyber defense solutions powered by industry-leading expertise, intelligence and innovative technology.

RKVST

RKVST

RKVST is a powerful tool that builds trust in multi-party processes when it’s critical to have high assurance in data for confident decisions.

ECS Ethiopia

ECS Ethiopia

ECS Ethiopia provides Ethiopia’s leading institutions with top cyber-security expertise and technology to enable them to overcome risks and market barriers enabling them to grow their business.

Rescana

Rescana

Rescana offers a cyber risk management platform with the vision to remove the security team bottlenecks, accelerating business processes that require risk assessment.

System Two Security

System Two Security

System Two Security automates detection engineering and threat hunting.