Businesses Reluctant To Adopt The Internet of Things?

The Report.png
Disaster Plan.png
Twitbook.png
It’s Magic
The Sticky Note.png

Why Are Some Businesses Reluctant To Adopt The Internet of Things?

Although personal users are beginning to embrace the ‘Internet of Things’ (IoT) with vigour (Gartner predict there will be 26 billion installed units by 2020), businesses have been slightly less enthused by its potential – why?

Security

The most stated reason by professionals is security issues; a recent GFI Software survey of 202 IT administrators discovered that an increased exposure to ‘existing and undiscovered threats’ was the greatest concern about IoT adoption. The survey claims that more than 75 percent of IT administrators would need to alter their security protocols in order to accommodate the changes in infrastructure which the IoT would bring about – including revisions to policies about employee connectivity.

It’s a view echoed by Nick Evans, Vice President of the office of the Chief Technology Officer at Unisys. “As IoT becomes more autonomous, potential cyber-vulnerabilities increase”, he said. “The potential for sabotage increases too, because these systems are often unprotected it’s relatively easy to move through them”.

The biggest problem is with the increased number of access points. While an average company may current have a total number of access points in the hundreds, the IoT could expand this into the thousands. Ultimately, each point needs to be secured – otherwise everything from in-car entertainment systems to your fridge at home could provide route into a company’s most important and valuable systems.

In truth, it is difficult to blame businesses for their stance. Cyber-attacks such as 2011’s Stuxnet worm and 2012’s Duqu Malware managed to cripple power and industrial systems whilst also stealing valuable data and intelligence. They left computer control systems devastated and ultimately severely impinged on companies’ bottom lines – making decision makers wary of further threats which they believe will become more common as the IoT grows.

Device Management Concerns

Another one of the major concerns raised by the survey respondents was device management. Sergio Galindo, General Manager of GFI Software’s infrastructure business, claims that although most businesses have some visibility into their connected devices, many do not monitor or regulate them. He points out that if Gartner’s prediction of 26 billion units comes to fruition, the number of potential flashpoints for problems is huge because the units will have chips that communicate with much larger systems. “How do you know they’re working, and who’s responsible when these [units] fail?” he asks. “IT departments have the responsibility, but not the capability, to manage them”.

The solution, it seems, is the development of global standards. Currently organisations around the world are trying to develop frameworks upon which these standards can be designed – but it’s a long and arduous process which needs to address such wide ranging issues as privacy, inter-device communication, what information is stored, and how information is managed. GS1 Auto-ID Labs recently told the US Federal Trade Commission that without these standards, proprietary or regional standards may evolve – thus threatening interoperability and locking purchasers to their vendors. “There is a strong need for global standardisation to reduce region-specific barriers to adoption”, they said at the time.

If the development of global standards are successful it could mark the first steps on the road to global IoT ubiquity – it would make it simpler to manage IoT devices and reduce the vulnerability of businesses to hackers. Until that time, businesses that want to embrace the IoT will have to create their own security procedures and hope that they are thorough enough to fully protect them.

By Daniel Price

Darach Beirne

Improve the Customer Experience by Connecting IT Silos

Connecting IT Silos Customer experience (CX) is a top priority for businesses across industries. The interactions and experiences customers have with a business throughout their entire journey – from first contact to becoming a happy ...
Kamal Maggon

Mining Business Value – Accelerating a US Company’s Cloud Transformation

Mining Business Value Traditional industries like mining have been slow to adapt to changing IP technology.  Of course, coal and other mining types have adopted new technologies starting with mechanical drills powered by pistons, then ...
Fernando Castanheira

How the Shift to Hybrid Work Will Impact Digital Transformations

The Shift to Hybrid Work Before COVID-19, most enterprises had a digital transformation in flight, but the pandemic threw those programs into hyperdrive. Scrambling to accommodate workforces that were suddenly working online and mostly from ...
Gary Bernstein

7 Ways To Ensure That Your Software Can Keep Up With Your Data

Keys To Managing Your Data Data has become a lot more important in our modern society. It is why many people consider data to be the new oil. It is as valuable as oil, and ...
Robots

How DSPs can Improve Straight Through Processing Rate in RPA Implementations by up to 82%

Robotic Process Automation Digital Service Providers (DSPs) today are well placed to take advantage of next-generation technologies like Robotic Process Automation (RPA), Machine Learning, and Artificial Intelligence. As most of the smart DSPs have already ...

TECH ELEARNING

The CloudTweaks technology lists will include updated resources to leading services from around the globe. Examples include leading IT Monitoring Services, Bootcamps, VPNs, CDNs, Reseller Programs and much more...

  • Plural Site

    Pluralsite

    Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization.

  • Isc2

    ISC2

    (ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees. If you want a job in cybersecurity, this is the route to take.

  • App Academy

    App Academy

    Immersive software engineering programs. No experience required. Pay $0 until you're hired. Join an online info session to learn more

  • Cybrary

    Cybrary

    CYBRARY Open source Cyber Security learning. Free for everyone, forever. The world's largest cyber security community. Cybrary provides free IT training and paid IT certificates. Courses for beginners, intermediates, and advanced users are available.