IoT

Data Privacy in IOT

Data Privacy in IOT

One of the most interesting transformations happening in the world is the adoption of IOT – internet of things - Automation (control) and monitoring of all things in our daily use by connecting these activities to the internet. Already existing real life cases include monitoring of automobiles’ health by auto companies, security monitoring and regulating home appliances, patient health monitoring etc.

IoT security risks and steps to safeguard

IoT security risks and steps to safeguard

Companies moving to capture the enormous opportunities presented by smart connected products and Internet of Things (IoT) face substantial risk as well, especially when it comes to the security of customer data and intellectual property in the cloud.

Traditional enterprise security solutions do not sufficiently address the security needs of the IoT as the IoT introduces new challenges such as:

 

  • Increased privacy concerns which are often unclear

  • Platform security limitations that affect basic security controls

  • Ubiquitous mobility that provides complications in tracking and asset management.

  • Cloud-based operations that make perimeter security less effective

What exactly is the Internet of Things (IoT) and how itÔÇÖs improper management affecting the security?

What exactly is the Internet of Things (IoT) and how itÔÇÖs improper management affecting the security?
IoT is ever growing network of physical objects that possess an IP address, for internet connectivity and the communication occurs between these objects and other Internet-enabled devices and systems.
 
Devices are embedded with electronics, software, sensors and connectivity to enable it to achieve greater value and service by exchanging data with the manufacturer, operator and/or other connected devices over a network. 
 
The Internet of Things provides a way to use collected data from sensor devices and various cloud solutions to gather, analyze, and act on data. IoT aims at connecting all potential objects which interact each other on the internet to provide comfort life for human.
 

Internet of Things (IoT) ÔÇô Security Challenges

Internet of Things (IoT) ÔÇô Security Challenges

The Internet of Things i.e. IoT is swiftly grabbing entire world and holds the potential to empower and advance nearly each and every individual and business. A large number of IoT applications deal with sensitive infrastructures, strategic services such as the distribution of water and power, or handle sensitive information about people, such as their location and movements, or their health and purchasing preferences , Transport Services including  Vehicle Management  and the list go on .  Hence, security plays an important factor on an IoT implementation.

Securing Internet of Things

Securing Internet of Things

There has been many revolutions in the world – political, social, industrial etc. The invention of internet has also been considered as an important revolution in the modern world. This revolution has been so powerful that today we can’t imagine a life without internet. Speed of internet has increased. Variety of devices has increased. For instance, during the early days, it was only a desktop through which we would connect to internet. Now, we have a whole lot of devices like laptop, tablet, smartphone, smartwatch and smart appliance too.

How IAM Strategy Will Change With the Introduction of Disruptive Technologies ?

How IAM Strategy Will Change With the Introduction of Disruptive Technologies ?

The pace at which the technology has changed in the past 5 years and the introduction to the disruptive trends has put most of the existing solutions obsolete or very soon to be obsolete. Organizations have lately started taking security and data seriously and Identity and Access Management (IAM) as a technology has got lot of attention because of the efficiency, compliance requirement, cost savings and minimal human intervention. IAM has grown from a good to have feature in the technology landscape to the most sought after requirement. Organizations moved away from home grown IAM solutions to professional vendors and suppliers to implement it.

Internet enabled lifesaving medical devices-Is it hack proof?

Hospitals have an increasing number of internet-enabled devices, all of which are hackable end points. Some connected devices, when infiltrated by a malicious agent, now pose a threat to people’s personal health and safety.
The potential threat of connected devices used in healthcare was brought to light after independent cyber security researcher Billy Rios announced that hospital drug pumps produced by Hospira, a leading medical supplier in the US, could be hacked due to vulnerabilities.
In a blog post (http://xs-sniper.com/blog/2015/06/08/hospira-plum-a-infusion-pump-vulner...), Billy précised that he had found that drug library updates – the lower and upper limits for the dosage of medicine that a patient can safely receive – could be changed remotely.

IoT ÔÇô Handle with care

Internet of Things

Internet of Things (IoT) device connects to internet automatically for sending or receiving data or to control some operations. The trend to use IoT is increasing very rapidly to enhance efficiency or convenience by business and home users, which is also increasing risk of cyber threats and gives opportunities to cyber criminals to enter into protected network or, still sensitive information or observer human lifestyle. Before using this new technology, it is significantly required to understand its vulnerabilities, risks and safeguards also user awareness on this is highly important to control the cyber-attacks.

Let us understand few examples of IoT devices. IoT device can be

Subscribe to RSS - IoT