Survey Suggests Data Loss And Unauthorized Access Are Key To Internet Of Things

Survey Suggests Data Loss And Unauthorized Access Are Key To Internet Of Things

Survey Suggests Data Loss and Unauthorized Access Are Key to Internet of Things

The high performance network security, enterprise, and data centre firewall company Fortinet have just released the results of their latest survey and found that data loss and unauthorised access are the most important issues facing the internet of things today.

The survey, conducted in June 2014, asked more than 1,800 homeowners across the world about the key issues that effected both their belief in and desire to embrace the internet of things.

Other key findings include:

  • A significant majority – 61 percent – claimed that they believed that ‘connected home’ (a home in which household appliances and home electronics are all connected to the internet) is ‘extremely likely’ to become a reality in the next five years. In India – on average the most positive country about the internet of things – the figure rose as high as 69 percent. This is great news for the industry; there are expected to be 9 billion devices connected to the internet of things by 2018.
  • Data security remains a significant issue across all aspects of internet usage, and the internet of things is no different. Nearly three quarters (69 percent) of respondents to Fortinet’s survey said they were either ‘extremely concerned’ or ‘somewhat concerned’ that a connected appliance could result in a data breach or an exposure of sensitive, personal information. India was once again the highest ranked country, with 81 percent of respondents highlighting the issue.
  • The cost of implementing the internet of things in the home is not a deterrent to most users. When asked “would you be willing to pay for a new wireless router optimised for connected home devices”, 40 percent responded with “definitely” and another 48 percent said “maybe”; in a follow-on question more than 50 percent said they would pay more for their Internet service in order to “enable connected devices to function” in their home. Although, despite consumers’ willingness to pay for a quality infrastructure, homeowners across the world still claimed that price was the number one factor likely to influence them, followed by features/functionality and brand.

(The Internet of Things Landscape) 

beecham_research_internet_of_things

(Image Source: Cisco /Beecham Research)

It is inevitable that privacy risks will arise as objects within the internet of things collect and aggregate fragments of data that relate to their service. The collation of multiple data points can swiftly become personal information as events are reviewed in the context of location, time, and recurrence, etc. Similarly to the early days of RFID tags in passports (when US-based passports could initially be read from 10 metres away with eBay equipment worth $250), the manufacturers and developers will need to find a way to eliminate these risks while still taking advantages of the benefits that that internet of things can offer.

It’s not an easy balance to make. What would you do? Let us know in the comments below.

By Daniel Price

About Daniel Price

Daniel is a Manchester-born UK native who has abandoned cold and wet Northern Europe and currently lives on the Caribbean coast of Mexico. A former Financial Consultant, he now balances his time between writing articles for several industry-leading tech (CloudTweaks.com & MakeUseOf.com), sports, and travel sites and looking after his three dogs.

Find out more
View All Articles

Sorry, comments are closed for this post.

The Importance Of Cloud Password Management

The Importance Of Cloud Password Management

Cloud Password Management A very obvious trend over the past few years has been organizations moving their business applications to the cloud. This trend has been talked about over and over again, including the benefits, drawbacks, implementation hurdles, etc. So what is the next step or advancement in cloud hosted applications? The next step is…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

Did The FBI Make A Mistake In Publicly Fighting Apple?

Did The FBI Make A Mistake In Publicly Fighting Apple?

Dropping The Gloves: The FBI vs Apple Unless you live in a completely disconnected bubble, you’ve heard all about the recent battle between Apple and the FBI. You’ve heard the arguments from different sides —you’ve probably even debated on one side or the other. Some argued that Apple was right because nothing should come above…

Dissecting Mr. Robot TV Series: Spotlight On Burning Online Privacy Risks

Dissecting Mr. Robot TV Series: Spotlight On Burning Online Privacy Risks

Mr. Robot And Burning Online Privacy Risks Despite the rapid development of web tools and computer security systems, online privacy remains a serious issue for most web users. According to some statistics provided by isaca.org, the total number of online security incidents worldwide grew to 42.8 million, leaving a great number of victims behind. As one…

It Takes a Village to Raise a Cloud

It Takes a Village to Raise a Cloud

The Community Cloud “We are special. We have unique needs. Our demands for compliance and security go way above your average organization. There is no way we are going to put our precious data in a public cloud. It is just a non-starter.” Sound familiar? This kind of reasoning is often the driver behind either…

How Successful Businesses Ensure Quality Team Communication

How Successful Businesses Ensure Quality Team Communication

Quality Team Communication  (Sponsored post courtesy of Hubgets) Successful team communication and collaboration are as vital to project and overall business success as the quality of products and services an organization develops. We rely on a host of business tools to ensure appropriate customer interactions, sound product manufacturing, and smooth back-end operations. However, the interpersonal relationships…

Featured Sponsored Articles
How To Develop A Business Continuity Plan Using Internet Performance Management

How To Develop A Business Continuity Plan Using Internet Performance Management

Internet Performance Management Planning CDN Performance Series Provided By Dyn In our previous post, we laid out the problems of business continuity and Internet Performance Management in today’s online environment.  In this article, we will take a look at some of the ways you can use traffic steering capabilities to execute business continuity planning and…

Featured Sponsored Articles
Optimizing Digital Marketing Through Accessibility & Aesthetics

Optimizing Digital Marketing Through Accessibility & Aesthetics

Optimizing Digital Marketing In The Cloud Marketers are constantly looking for better ways to tantalize and engage customers, and there’s no space more competitive than the digital universe. Deliberating over pleasing layouts, effective calls to action, site responsiveness, and much more, digital marketers have more than enough to keep themselves busy without understanding the intricacies…

Featured Sponsored Articles

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Sponsor