Please wait while the search results are loading...

CyberSecurity Challenges for the Internet of Things (IoT), Business and Industry Trends Analysis

IoT is a revolutionary, disruptive technological concept.  It is also potentially invasive of our homes, offices, automobiles and even our outdoor surroundings.  Since the whole point of IoT is to gather data at the “endpoint,” that is at the point where the data is created, and then analyze that data in remote computer systems, often with ultra-powerful artificial intelligence, it is designed to surround us.  IoT will gather and transmit data about mundane things like what temperature we set on our thermostats and what items we put in refrigerators.  On a more personal basis, it will know where we are heading in our vehicles, what we look like as we pass by a digital camera and perhaps what we weigh when we get on a bathroom scale.  The possibilities are endless.  Unfortunately, the possibilities for abuse are likewise endless, including the potential for hackers to enter our homes and offices via IoT devices.  Used well, IoT will make the world more convenient, efficient, environmentally sound and “safer”.  But, that potential for “safer” has a big “IF” in front of it.
Radical new ways of blocking hackers, spyware, malware, abuse of personal data and uninvited invasion of privacy are called for if consumers and businesses are going to feel enthusiastic enough about IoT to invest in and utilize new devices, such as IoT-enabled appliances and health monitors in the home, intelligent transportation technologies in cars and advanced inventory or machinery management in factories and offices.  This means an urgent need for improved network and device security at all levels, from firewalls and Wi-Fi routers to advanced software on devices and nodes. 
One pioneer in developing secure technologies for the world of IoT is Boston-based Cybereason, Inc., www.cybereason.com, which is focused on securing connected endpoint devices.  Companies that can solve security needs may eventually have a global market of 1 trillion connected devices or more.  Likewise, Veridify Security, www.veridify.com, formerly SecureRF, is developing innovative security solutions for IoT devices.
IoT relies heavily on Wi-Fi, which is notoriously open to hacking, as well as on advanced 5G wireless services.  Unfortunately, security and malware on smartphones and wireless monitors are already a great concern.  Thousands of stories already abound in the news media of clever ways that hackers have utilized thermostats and other devices connected to business networks in order to enter servers and extract critical data files.  One example is hackers that utilized a connection made to a non-secure thermostat on a large aquarium in a U.S. casino.
Traditionally, connected devices in the home or office, such as alarm systems, smart thermostats and webcams, have not been well protected from hacking.  Consumers of IoT at all levels, from individual households to government agencies, businesses and industrial giants, will soon face a significant challenge:  What device and wireless service brands can they trust?  At what level are they willing to trade privacy for the potential efficiencies of IoT-enabled devices?


A Representative List of Organizations that Have Used our Research and Products:



Testimonials

I’m amazed at how much information is available and the various ways to access it. This will be a major resource for our serious job seekers.

Career Services, Penn State University

Plunkett Research Online provides a great ‘one stop shop’ for us to quickly come up to speed on major industries. It provides us with an overall analysis of the market, key statistics, and overviews of the major players in the industry in an online service that is fast, easy to navigate, and reliable.

Wendy Stotts, Manager, Carlson Companies

I really appreciate the depth you were able to get to so quickly (for our project). The team has looked through the material and are very happy with the data you pulled together.

Hilton Worldwide, Marketing Manager

We are especially trying to push Plunkett since all of our students have to do so much industry research and your interface is so easy to use.

Library Services, St. John’s College

We are especially trying to push Plunkett’s since all of our students have to do so much industry research and your interface is so easy to use.

Gary White, Business Materials Selector, Penn State University

Your tool is very comprehensive and immensely useful. The vertical marketing tool is very helpful, for it assists us in that venue, as well as targeting customers’ competition for new sales…The comprehensive material is absolutely fabulous. I am very impressed, I have to say!

Tammy Dalton, National Account Manager, MCI

The more I get into the database, the happier I am that we’ll have it–REALLY happy!!! Between the quality and affordability of your product, its appeal to and value for our users, and the inestimably ethical and loyalty-guaranteeing conduct of your business, I will always have more than sufficient praises to sing for Plunkett Research.

Michael Oppenheim, Collections & Reference Services, UCLA

Plunkett Research Online is an excellent resource…the database contains a wealth of useful data on sectors and companies, which is easy to search and well presented. Help and advice on how to conduct, export and save searches is available at all stages.

Penny Crossland, Editor, VIP Magazine
Real Time Web Analytics