The idea of an internet of things has grown from being only possible in movies and music videos to one of the most viral topics on any media platform, it is slowing becoming a reality. While a lot of people depend on networks at work and even in places where they don’t know they are connected to other devices, a lot of security still needs to be implemented in order to realize the frontier of the internet of things.
A lot of CEOs in companies around the world have the intention of placing part of the total concept of the internet of things to play in their organizations and some even to the homes of their employees.
how long would it take for someone to switch the IoT off.
In polls started and managed by cybersecurity experts, more than 80% of respondents are in favor of the eventual ability of devices talking together to make work environments more productive.
IO – the data center giant, along with experts in internet security, Webroot, both predict 2016 to be a momentous year in as far as our tiny steps towards realizing IoT (Internet of Things)is concerned. A lot of companies (upwards of 75% of UK pooled samples) confirm their need for an IoT Officer. If you had not started taking the topic seriously, now is the time to change your attitude.
While predictions are looking good, there are still concerns about the security of our current internet connections and their collective ability to protect vital data points in a state we have grown fond of calling the internet of things.
Speaking at the recent World Cyber Security Technology Research Summit or 2016, renowned Dr U. Lindqvist, confirmed how unprepared our security strategies would be in a world of the IoT. The also director of SRI int, challenged security companies and internet authorities to do all the required preparations before getting to the IoT milestone. A lot of consideration as to who would be responsible for managing the key device that brings everything together (or if it will even be one device), was raised. Reasonably, users are sources of attacks, manufacturers are limiting factors, a lot of other stakeholders to the mix all bring security concerns that until now have not been tried to solve.
Physical, logical and cryptographic lines need to be drawn to keep the good and the bad in harmony. Good users and bad motivated hackers will be just as connected to everything else as users who don’t know more about security beyond their birthday password combinations.
In a final definitive blow to more egos than we can count, the knowledgeable Dr stated how as a unit, we lack the experience and knowledge of what needs to be changed to our way of doing things such that the internet of things will be safe for all users and connected devices. All the strategies we use currently rely on timely updates to what has already been identified as threats, what if everything was connected and threats spread faster than their remedy –