Businesses Reluctant To Adopt The Internet of Things?

Why Are Some Businesses Reluctant To Adopt The Internet of Things?

Although personal users are beginning to embrace the ‘Internet of Things’ (IoT) with vigour (Gartner predict there will be 26 billion installed units by 2020), businesses have been slightly less enthused by its potential – why?

Security

The most stated reason by professionals is security issues; a recent GFI Software survey of 202 IT administrators discovered that an increased exposure to ‘existing and undiscovered threats’ was the greatest concern about IoT adoption. The survey claims that more than 75 percent of IT administrators would need to alter their security protocols in order to accommodate the changes in infrastructure which the IoT would bring about – including revisions to policies about employee connectivity.

It’s a view echoed by Nick Evans, Vice President of the office of the Chief Technology Officer at Unisys. “As IoT becomes more autonomous, potential cyber-vulnerabilities increase”, he said. “The potential for sabotage increases too, because these systems are often unprotected it’s relatively easy to move through them”.

The biggest problem is with the increased number of access points. While an average company may current have a total number of access points in the hundreds, the IoT could expand this into the thousands. Ultimately, each point needs to be secured – otherwise everything from in-car entertainment systems to your fridge at home could provide route into a company’s most important and valuable systems.

In truth, it is difficult to blame businesses for their stance. Cyber-attacks such as 2011’s Stuxnet worm and 2012’s Duqu Malware managed to cripple power and industrial systems whilst also stealing valuable data and intelligence. They left computer control systems devastated and ultimately severely impinged on companies’ bottom lines – making decision makers wary of further threats which they believe will become more common as the IoT grows.

Device Management Concerns

Another one of the major concerns raised by the survey respondents was device management. Sergio Galindo, General Manager of GFI Software’s infrastructure business, claims that although most businesses have some visibility into their connected devices, many do not monitor or regulate them. He points out that if Gartner’s prediction of 26 billion units comes to fruition, the number of potential flashpoints for problems is huge because the units will have chips that communicate with much larger systems. “How do you know they’re working, and who’s responsible when these [units] fail?” he asks. “IT departments have the responsibility, but not the capability, to manage them”.

The solution, it seems, is the development of global standards. Currently organisations around the world are trying to develop frameworks upon which these standards can be designed – but it’s a long and arduous process which needs to address such wide ranging issues as privacy, inter-device communication, what information is stored, and how information is managed. GS1 Auto-ID Labs recently told the US Federal Trade Commission that without these standards, proprietary or regional standards may evolve – thus threatening interoperability and locking purchasers to their vendors. “There is a strong need for global standardisation to reduce region-specific barriers to adoption”, they said at the time.

If the development of global standards are successful it could mark the first steps on the road to global IoT ubiquity – it would make it simpler to manage IoT devices and reduce the vulnerability of businesses to hackers. Until that time, businesses that want to embrace the IoT will have to create their own security procedures and hope that they are thorough enough to fully protect them.

By Daniel Price

David Loo
The Long-term Costs of Data Debt It’s no secret that many of today’s enterprises are experiencing an extreme state of data overload. With the rapid adoption of new technologies to accommodate pandemic-induced shifts like remote ...
Jim Fagan
Subsea Connectivity Digital transformation and the migration of data and applications to the cloud is a global phenomenon. While we may like to think that the cloud knows no borders, the reality is that geopolitics ...
Rajesh Khanna
Implement Hyperautomation to Scale Automation Programs by 3X Most Digital Service Providers (DSPs) struggle to accelerate their path to Hyperautomation due to the complex processes with legacy systems and applications. Although Robotic Process Automation (RPA) plays a ...
Rahul
How to Start Your Cloud Career Cloud computing is the present. And it is the future as well!! In fact, a quote by Chris Howard says, ‘Cloud Computing is a spectrum of things complementing one ...
Gary Bernstein
Secure Remote Authentication When employees are working remotely, they need to be able to access company resources and applications just as if they were in the office. This means that remote authentication needs to be ...

SECURITY TRAINING

  • Isc2

    ISC2

    (ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees. If you want a job in cybersecurity, this is the route to take.

  • App Academy

    App Academy

    Immersive software engineering programs. No experience required. Pay $0 until you're hired. Join an online info session to learn more

  • Cybrary

    Cybrary

    CYBRARY Open source Cyber Security learning. Free for everyone, forever. The world's largest cyber security community. Cybrary provides free IT training and paid IT certificates. Courses for beginners, intermediates, and advanced users are available.

  • Plural Site

    Pluralsite

    Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization.