The Questions of Privacy In The Internet of Things Revolution

Privacy in the Internet

The Internet of Things (IoT) has been promising a lot to consumers for a few years and now we’re really starting to see some of the big ideas come to fruition, which means an ever-growing conversation around data security and privacy.

Big data comes with big responsibilities and it goes far beyond the smartphone in your pocket or the watch on your wrist. Innovations like the smart home are a prime example of where IoT can and will have a profound effect on how people live and how their privacy may be affected.

This was made rather evident just last week when Amazon announced its new Dash button products. Initially believed to be an April Fool’s joke, it was very much real but on paper sounds like an incredibly convenient feature for the home. The Dash button is a product-specific piece of hardware that can be placed anywhere in the home and used to order that product quickly by just hitting the button. The connected button, linked to your Amazon account, will place an order right away. So next time you’re loading up your washing machine and find you’re running low on detergent, you can easily push that button and the rest takes care of itself.

Nest Lab

The Google-owned Nest Lab is perhaps the closest thing we have to a ubiquitous smart home product, or it’s at least on the way there. The company makes smartphone-connected thermostats that operate through your phone and allows you to set your thermometer from afar. This is the essence of the Internet of Things, a machine talking to another, taking the human touch of things and this has some privacy experts concerned. It knows when you’re home and when you’re out.

The main reason for this concern or apprehension is not a case of technophobia or 21st century luddites but rather the fact that the Internet of Things is moving rapidly with little indication of what the end result will look like.

The conversation around data privacy is at its most pertinent right now as consumers begin to really ask the question of how their data is being used and who sees it.

Smart Home Movement

smart-homes

(Image Source: ekimetrics.com)

Smart homes are not the only concern. The Internet of Things technologies, such as sensors that gather data, are being employed by city governments in smart city solutions. These all have serious benefits in tracking and ultimately curtailing issues like air pollution or traffic congestion. So whether it’s the smart home or the smart city, the one vision that is becoming rather clear is that this technology will indeed be everywhere and running everything.

Having all this data travelling through different channels from device to device, and company to company, raises the issue over whether or not the consumer and the companies behind these products are still asking enough questions?

Countless experts in the fields of academia, politics and of course tech companies are scrambling for ways to reach a common ground around regulation and data collection. The International Conference on Safety and Security in Internet of Things, the second instalment of the conference taking place Italy later this year, will attempt to address some of these problems.

The United States’ Federal Trade Commission (FTC) back in January published a report that shared its views on the IoT for the future, which stated that there are now 25 million connected devices in the world and growing.

Securing Systems Before – Not After

According to the FTC, companies need to “build security into devices at the outset, rather than as an afterthought in the design process.” This is to ensure the integrity of security systems as security needs to be built in from the beginning rather than retrofitted, as opting with the latter will mean that cracks will always remain. The FTC also encourages the expansion of training for employees working with IoT technology and services and more robust security monitoring and patching practices.

The Internet of Things has great potential, said the governmental body, but security shortcomings could “undermine consumer confidence,” which would have far reaching effects on the business future for many companies, leaving budding big data and IoT start-ups particularly vulnerable.

The general consensus among Government, business, and consumers is that a middle ground must be reached between technological innovation and a person’s right to data privacy and reaching that accord will be vital to the future of this rapidly expanding industry.

By Jonathan Keane

Louis
More CISOs will have to deliver revenue growth to protect their budgets and grow their careers in 2023 and beyond, and a core part of that will be getting multicloud security right. It’s the most common infrastructure strategy for ...
Stacey Farrar
Modern Auth and Exchange Online Migrations Microsoft has phased out Basic Authentication (Basic Auth), replacing it with Modern Authentication (Modern Auth) to provide increased protection and user security. Through this, Microsoft has turned off Basic ...
Jen Klostermann
The Fintech Landscape The Nitty Gritty Although the COVID-19 pandemic has highlighted its existence, most of us have been using fintech in some form or another for quite some time. It’s a big part of ...
Frank Suglia
Migrating Microsoft Office 2013 As of April 11, 2023, Microsoft will stop supporting Office 2013. The decision to end support for Office 2013 should come as no surprise. Over the past several years, Microsoft has ...
Gilad David Maayan
Network Security in the Public Cloud What is Network Security? Network security is a strategic approach to securing an organization’s resources and data across the corporate network. It helps protect organizations of all sizes, industries, ...
Patrick Melampy
Cloud On-Ramp and Protecting Performance The expansion of remote work and the massive growth in usage of cloud-based applications have stressed existing infrastructure and put a keen focus on the performance of everyone’s network environment ...
Drew Firment
Stop Focusing on Cloud Adoption and Start Focusing on Cloud Maturity For the past several years, most organizations have made it their priority to shift much of their applications and data from on-premises to the ...
Security Breach 10 Useful Cloud Security Tools
Cloud Security Tools Cloud providing vendors need to embed cloud security tools within their infrastructure. They should not emphasize keeping high uptime at the expense of security. Cloud computing has become a business solution for ...
Cloud For Dummies.png
The Manuscript.png
Disaster Recovery Plan.png
Data Fallout.png

PLURALSITE

Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization. 

(ISC)²

(ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees.

CYBRARY

CYBRARY Open source Cyber Security learning. The world's largest cyber security community. Cybrary provides free IT training certificates. Courses for beginners, intermediates, and advanced users are available.