There are conflicts, challenges, concerns, and opportunities, in present and looming form. The panelist articulated flaws, along with solutions to data encroachments. Clearly, they recognized no scheme exists – capable of preventing all breaches. The bad guy, foreign entity, organized crime, fellow employee, and hater, are staying ahead of the good guys. In the end, reasons surface not to assume protections are guaranteed, from internet connected products and services.
The Internet of Things Security 2015 Conference took place in Boston, MA, on September 22-23, 2015, at the Renaissance Boston Waterfront Hotel. Topics delved into future risks, standardization, privacy, safer smarter cities, hacking wearable devices, and networks. Their importance is highlighted by anticipated industry values; estimates say it’s now at $4 billion with perhaps growth to $50 billion by 2020. Among major players in IoT Security is Symantec, who owns Norton Products.
Consider a house. The windows and doors are always places of vulnerabilities. IoT Security risks arise from a collectiveness of starting point, processing channels, to ending point. Infringement at any junction undermines entire system, be it end-user device up to an entity’s centralized center. Hence, the weakest link may well represent the maximum level of strength achievable. The discussions further established not to expect a silver bullet. And thus, best practices are about applying layers of defense. The techniques of encryptions, verifications, trainings, and passwords, still resonate. However, enterprising firms, and security providers, are also utilizing algorithms to aid in detection of unscrupulous tactics. This community, in broader form, encompassing enforcement agencies, corporate sectors, advocacy groups, the white hats, etc., is working to create a framework of standardization. Something believed crucial to overcoming sinister assaults. Two ideal sources are National Institute of Standards and Technology and Online Trust Alliance. The mandate is everyone must take a pro-active role.
So what is changing today’s situation? Fundamentally, IoT Security is as critical to sporting teams or artists, as to manufacturers or healthcare providers, or governmental agencies and educational institutions; reflective of what’s for safekeeping. The simple answer is economics. Where key records of employees and customers are compromised an organization’s revenue stream and reputation usually suffers. That’s added to liability costs. Yet, connected products and services continue to be sold without highest available levels of protection, if any. This calculated move emphasizes getting 1st and quickest to marketplace; positioning to beat out competition. But frankly, customers are considered not active on demanding privacy and security measures, with purchasing decisions; necessitating new stronger federalized people rights for an increasingly tech based economy. Nonetheless, despite much fanfare to reduce risk levels, efforts are impacted by political leaders bickering, stagnating world economies, war torn countries, terrorism, and so on.
Conclusively, the IoT Security conference magnified understanding about attacks persons and organizations are facing; in such same breathe of discomfort, intuitive ways were offered to counteract them. The underlying whisper solidifies this industry is poised for incredible expansion. Difficulties though still lie ahead, as standardization is both a noble goal and double edge sword. And the sum of better strategies cannot totally negate frailties from the human element always within the equation.