Inside the Briefcase

Augmented Reality Analytics: Transforming Data Visualization

Augmented Reality Analytics: Transforming Data Visualization

Tweet Augmented reality is transforming how data is visualized...

ITBriefcase.net Membership!

ITBriefcase.net Membership!

Tweet Register as an ITBriefcase.net member to unlock exclusive...

Women in Tech Boston

Women in Tech Boston

Hear from an industry analyst and a Fortinet customer...

IT Briefcase Interview: Simplicity, Security, and Scale – The Future for MSPs

IT Briefcase Interview: Simplicity, Security, and Scale – The Future for MSPs

In this interview, JumpCloud’s Antoine Jebara, co-founder and GM...

Tips And Tricks On Getting The Most Out of VPN Services

Tips And Tricks On Getting The Most Out of VPN Services

In the wake of restrictions in access to certain...

IoT is Moving Faster Than Regulations Can Keep Up With

October 14, 2015 No Comments

Featured blog by Xander Schofield, Independent Technology Writer

The “Internet of Things” or (IoT) is growing at the speed of light and continues to expand at the same pace. According to Business Insider Intelligence, businesses are expected to comprise most of the growth in IoT-connected devices, with almost 10 billion devices being implemented in enterprise applications. Moreover, the number of installed IoT technologies is projected to spike from approximately 4.3 billion in 2015 to 23.4 billion by the end of 2019. With such a massive volume of data being exchanged among business using IoT-connected devices, it seems practical for businesses to determine how this data will be managed and thus regulated for both the short and long term.

How Businesses Can Adjust to IoT Growth

Businesses can adjust to massive IoT growth using log management software. Although there are some native log management functionalities integrated with Windows and Unix, or with networks such as Cisco, they lack the consolidating ability necessary to store data and archive it in an efficient way. However, third-party software that has comprehensive log management, offers integrated data consolidation, archiving, updating, monitoring and reporting that converts log data into insightful information. Some applications can be downgraded or upgraded to accommodate additional devices, networks or log sources with minimal to no configuration.

How Businesses Can Adjust to IoT Regulations

IoT regulations cover a broad spectrum, such as security, data protection, standards, spectrum management, licensing, privacy and competition. Businesses need to proactively familiarize themselves with all regulatory aspects of IoT technology that could significantly impact their infrastructure. A large IP address space is required to identify each connected object as provided by versions 6, IPv6, for example.

Privacy and security are two interrelated issues that need special attention when deploying large-scale IoT. Businesses located in smart cities are especially vulnerable to cyber attacks if there is a lack of IoT security. The suggestion of regulators to businesses found within this environment is to integrate security and privacy functionality into their devices from the launch of the IoT development process to maximize its effectiveness.

In addition, companies developing and operating IoT systems need to conduct pen testing and discern how security vulnerabilities discovered after devices are sold can be fixed during their lifespan. One of the most recent ways cyber attackers are performing espionage is using a drone and a mobile phone’s app (the phone’s app establishes a false access point) designed to divert documents transmitted to a vulnerable Wi-Fi printer. Overall, privacy regulators favor data minimization as a business solution for protecting privacy in consumer IoT devices; this means clamping down on the amount of personal data collected or archived which in turn minimizes the risk of data breaches and/or using data for an unintended purpose(s).

There are a variety of different IoT applications and stakeholders who all have different objectives and requirements. In light of this information, businesses will also need to seriously consider adopting an IoT standard that is accepted on a global scale. Presently, the ITU Telecommunication Standardization Sector (ITU–T) has developed a Global Standards Initiative on Internet of Things (IoT-GSI) to encourage unity amidst a rapidly developing IoT world. There are also application-specific frameworks such as the M/490 Smart Grid reference architecture designed to improve critical security risk-management processes.

The total global generation value of IoT technologies could reach anywhere from $2.7 trillion to $14.4 trillion by 2025. Spurred by the insightful 2015 journal written by Adam Thierer about emerging technology, a few groups are already urgently petitioning policymakers to limit or control IoT technologies due to hypothetically poor privacy or poor security issues that may arise in the near future.

 

 

Leave a Reply

(required)

(required)


ADVERTISEMENT

DTX ExCeL London

WomeninTech