June 25, 2014

Survey Suggests Data Loss And Unauthorized Access Are Key To Internet Of Things

By Daniel Price

Unauthorized Access

The high performance network security, enterprise, and data centre firewall company Fortinet have just released the results of their latest survey and found that data loss and unauthorised access are the most important issues facing the internet of things today.

The survey, conducted in June 2014, asked more than 1,800 homeowners across the world about the key issues that effected both their belief in and desire to embrace the internet of things.

Other key findings include:

  • A significant majority – 61 percent – claimed that they believed that ‘connected home’ (a home in which household appliances and home electronics are all connected to the internet) is ‘extremely likely’ to become a reality in the next five years. In India – on average the most positive country about the internet of things – the figure rose as high as 69 percent. This is great news for the industry; there are expected to be 9 billion devices connected to the internet of things by 2018.
  • Data security remains a significant issue across all aspects of internet usage, and the internet of things is no different. Nearly three quarters (69 percent) of respondents to Fortinet’s survey said they were either ‘extremely concerned’ or ‘somewhat concerned’ that a connected appliance could result in a data breach or an exposure of sensitive, personal information. India was once again the highest ranked country, with 81 percent of respondents highlighting the issue.
  • The cost of implementing the internet of things in the home is not a deterrent to most users. When asked “would you be willing to pay for a new wireless router optimised for connected home devices”, 40 percent responded with “definitely” and another 48 percent said “maybe”; in a follow-on question more than 50 percent said they would pay more for their Internet service in order to “enable connected devices to function” in their home. Although, despite consumers’ willingness to pay for a quality infrastructure, homeowners across the world still claimed that price was the number one factor likely to influence them, followed by features/functionality and brand.

 

It is inevitable that privacy risks will arise as objects within the internet of things collect and aggregate fragments of data that relate to their service. The collation of multiple data points can swiftly become personal information as events are reviewed in the context of location, time, and recurrence, etc. Similarly to the early days of RFID tags in passports (when US-based passports could initially be read from 10 metres away with eBay equipment worth $250), the manufacturers and developers will need to find a way to eliminate these risks while still taking advantages of the benefits that that internet of things can offer.

By Daniel Price

Daniel Price

Daniel is a Manchester-born UK native who has abandoned cold and wet Northern Europe and currently lives on the Caribbean coast of Mexico. A former Financial Consultant, he now balances his time between writing articles for several industry-leading tech (CloudTweaks.com & MakeUseOf.com), sports, and travel sites and looking after his three dogs.
Gary Bernstein

The AI Vanguard: MixMode’s 2024 Insight into Cybersecurity’s New Era

Insight into Cybersecurity’s New Era As we enter into 2024, the adoption of AI in [...]
Read more
Jennifer Nwokolo

8 Useful Tools For Risk Assessment and Management

Risk Assessment and Management Risks are inevitable in every business venture. Generally, most organizations aim [...]
Read more
Freshworks

Freshservice’s Journey to Streamlining IT Operations

Freshservice, a cloud-based IT service management solution, is a part of Freshworks Inc., a company [...]
Read more
Andy Hilliard

Accelerance CEO Unveils the Future: AI’s Role in Software Development

In this edition of CloudTweaks, we feature an insightful discussion with Andy Hilliard, CEO of [...]
Read more
Alex Fink, CEO of the Otherweb

AI is Eating the World: The Evolution of Content in the Age of AI

AI is Flooding The World In the constantly evolving landscape of technology, “AI is eating [...]
Read more

5 Reasons You Need DAST to Secure Your Cloud

5 Reasons You Need DAST to Secure Your Cloud What Is DAST? Dynamic Application Security [...]
Read more

SPONSOR PARTNER

Explore top-tier education with exclusive savings on online courses from MIT, Oxford, and Harvard through our e-learning sponsor. Elevate your career with world-class knowledge. Start now!
© 2024 CloudTweaks. All rights reserved.