IoT - Pandemics, Opportunities And Massive Data Risks

The Internet of Things (IoT) is an electronic system, which is develoong at ever-increasing pace since it began in 2000, of interrelated computing devices, mechanical and digital machines that each have unique identifiers. This process transfers very large amounts of data over a network without requiring human or computer interaction and this data is difficult to process using traditional management tools. 

As part of the development  Internet of Things (IoT) massive amounts of unstructured machine data will be inevitably created. The experst at McKinsey estimates that by 2025, the world will own 50 billion networked devices, a 400 per cent increase on 2010, and creating $11 trillion in economic value. 

While this proliferation of networked technology over the last 20 years has created a myriad of opportunities for businesses, governments and developers to explore it has created new challenges to overcome.

Right now, the IoT is very little use in combating the COVID-19  epidemic although it probably can be used to prevent future pandemics. The consulting firm Frost & Sullivan, have outlined a future healthcare scenario  defined by a network of IoT  sensors placed throughout the world that would be used to monitor individuals for infections, acting as an early detection system that would reduce uncertainty and provide governments with reliable data to quickly act on and stop the spread. 

What Is The IoT?
Put simply, IoT is a system of physical objects that can be discovered, monitored, controlled, or interacted with by electronic devices that communicate over various networking interfaces and eventually can be connected to the wider Internet. The IoT landscape ranges from smart tags to sensing and monitoring wearable devices and to more complex objects such as appliances, machines, and cars. These smart objects constitute the building blocks of smart environments such as smart homes, buildings, factories, and cities.

What Are The Risks?
With the wide scale of IoT systems, the security and cyber-threats are magnified, by virtue of the sheer size of the ‘attack surface’ and number of potential entry points. According to recent data, 26.66 billion IoT devices were active in 2019 and 127 new devices are being connected to the Internet every second. 

The key challenge is the management and protection of all the data that IoT captures and uses, there are a number of ways to address this for developers of devices, users and insurance providers.

A primary concern, as with most cyber-risks, is the loss or compromise of data, especially customer and personal data. As a result, privacy should be a crucial component of IoT, especially with regards to data transmission. In one incident, a casino had high profile customer data stolen via the WiFi connected temperature monitor in their smart aquarium. As supply chains and business processes become more reliant on networked devices, businesses are more at risk of attack. Significant business interruption, through devices being taken offline by a hack can result in a significant loss in revenue, or even worse, reputation and trust.

An emerging risk of IoT is that of cyber-physical, take the example of a medical devices such as pacemakers, self-driving cars or expensive industrial processes controlled by a connected device. A malicious hack of these devices, taking control of these activities could lead to costly and potentially dangerous physical damage or accidents.

Stuxnet was one of the first instances of a computer worm destroying real-world devices, as opposed to just hacking them to perform software damage. 

Stuxnet targeted programmable logic controllers (PLCs) used to control uranium centrifuges (machines used to isolate isotopes of uranium) and reprogrammed them to perform varying cycles that result in the centrifuges disintegrating. Although Stuxnet was not a typical IoT attack because it relied on PLCs to be connected to a Windows machine, it represents a clear example of the damages caused by hacking mission-critical devices.

How To Reduce & Alleviate The Risks
Measures users can take to limit risk (and indeed liability in the event of a cyber-incident) include: considering security requirements since the initial stage of system design; using strong passwords and security keys, updated regularly; monitoring devices and systems to detect and swiftly response to security events; continuously updating security of devices with the download of patches from the manufacturers.

Insurers have a crucial role in mitigating these risks through varying degrees of cover which address risks including compromised networks, business interruption of IoT (if they are taken offline) and the theft of data.

Conclusion
It is clear that the IoT is becoming increasingly central to both our way of life and how businesses and infrastructure operates. As the opportunities for innovation grow, it is paramount that we remain conscious of the risks at play and how we mitigate these. The combination of IoT and 5G will transform society for the better, but that there are a lot of security risks to consumers and businesses that can't be left unchecked.

IoTForAll:       ITProportal:    ITProPortal:        Motley Fool:       BC Courier

You Might Also Read:

Mandatory IoT Security In Britain:

 

 

 

 

« Zoom-Bombing Hijackers
The US Has A New 5G Security Strategy »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Contrast Security

Contrast Security

Contrast Security is the leader in modernized application security, embedding code analysis and attack prevention directly into software.

CyberSecurityJobsite.com

CyberSecurityJobsite.com

CyberSecurityJobsite.com is a specialist job board designed to attract candidates working within Cyber Security, Information Security or Information Assurance.

Spiceworks

Spiceworks

Spiceworks provide a range of free apps for IT professionals including network inventory, network monitor, and help desk.

WISeKey

WISeKey

WISeKey is a leading cybersecurity company currently deploying large scale digital identity ecosystems for people and objects using Blockchain, AI and IoT.

Cyscale

Cyscale

Cyscale automates the contextual analysis of cloud misconfigurations, vulnerabilities, access, and data, to provide an accurate and actionable assessment of risk.

Cyble

Cyble

Cyble Vision enables faster detection of cyber threats and focuses on identifying and analysing the motivations, methods, capabilities and tools of adversaries.

iSecurity Consulting

iSecurity Consulting

iSecurity delivers a complete lifecycle of digital protection services across the globe for public and private sector clients.

Stratum Security

Stratum Security

Stratum Security is an information security consulting company that focuses on providing clear and concise risk guidance to its clients through high quality assessment services.

Guidehouse

Guidehouse

Guidehouse is a leading global provider of consulting services to the public and commercial markets with broad capabilities in management, technology, and risk consulting.

CAPSLOCK

CAPSLOCK

CAPSLOCK delivers career-changing cyber training to help adults re-skill. Learn online to become a cyber security professional and pay no tuition until you land a high-paying job.

AnaVation

AnaVation

AnaVation is a trusted partner delivering high-value, cost-effective solutions that solve the most complex technical and analytical problems for our customers.

PKF Infuse

PKF Infuse

PKF Infuse provide the highest level of cybersecurity support, implementing practical solutions to protect against cyber-attacks, from simple phishing scams to complex data security breaches.

iManage

iManage

iManage's intelligent, cloud-enabled, secure knowledge work platform enables organizations to uncover and activate the knowledge that exists inside their business.

Pillr

Pillr

Pillr is a cybersecurity operations platform capable of adapting to the demands of your business and team — and the global threat landscape.

ThreatER

ThreatER

ThreateER (formerly ThreatBlockr / Bandura Cyber) is a cybersecurity platform that provides active network defense by automating the discovery, enforcement, and analysis of cyber threats at scale.

CMD+CTRL Security

CMD+CTRL Security

CMD+CTRL Security is a pioneer in software security training. Industry-leading organizations rely on our training solutions to make software secure wherever it runs.