• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • About
    • Secure360
    • UMSA
    • Get Involved
  • Events
    • Secure360 2021
    • Student360
    • Past Events
      • 2020 Secure360 Twin Cities
      • 2020 Student360
      • 2019 Secure360 Twin Cities
      • 2019 Student360
      • 2018 Secure360 Twin Cities
      • 2018 Secure360 Wisconsin
      • 2018 Student360
      • 2017 Secure360 Twin Cities
      • 2017 Student360
      • 2016 TC Secure360 Conference
      • 2015 Secure360 Conference
      • 2014 Secure360 Conference
      • 2013 Secure360 Conference
        • 2013 Secure360 Conference Speaker Presentations
      • 2012 Secure360 Conference
  • For Sponsors
    • Secure360 Twin Cities
    • Student360 Sponsors
  • For Speakers
    • Secure360 Speaker Details
    • Student360 Speaker Details
  • Blog
  • Nav Social Menu

    • Facebook
    • LinkedIn
    • Twitter
    • Vimeo

Secure360

5 tips for implementing IoT security

October 31, 2016 by Secure360 and UMSA

security for the internet of things

internet of things security

The Internet of Things (IoT) is everywhere, linking our homes, offices, cars, personal fitness and coffee machines into one giant connected network. With an estimated 5.5 million new “things” connected each day, and an expected 6.4 billion in circulation by the end of 2016, according to Gartner research, the IoT will increasingly become part of our lives.

With all these devices connected and communicating many of our personal and private information, security of IoT is more important than ever. Even the smallest, most minimally connected device must have the appropriate safeguards built in throughout its lifecycle. It’s time to focus on IoT security at the point of design to securely manage devices from inception through implementation.

Here are 5 basic tips for implementing IoT security:

1. Implementing BYOD policies

Data breaches are often the result of employees losing track of company-owned devices such as laptops, tablets and storage devices containing sensitive information. This problem is made worse by employees using their own devices for work related tasks. Businesses must be implementing policies that stress the need for employees to keep track of their devices, as well as encrypting their company-owned devices using a certified encryption methodology.

2. It must start with the manufacturers

Achieving security with IoT devices may rest less on the businesses that use IoT devices and more on those that manufacture them. Manufacturers must be designing security from the beginning, both in software and hardware.

3. Broad security is a necessity

IoT security must span beyond just the end device, but also through the cloud and any other systems that touch the device. Vulnerabilities affecting end devices can also have a negative impact on the systems and service that the device uses.

4. Don’t be afraid of manual

While technology is amazing and can help make our lives easier, over-reliance on technology can only lead to disaster. IoT holds personal information, financial data, and other sensitive information, so businesses and individuals must be careful to jump into this increasingly-interconnected world only to put themselves in the path of additional risk of attack.

5. Pile on the layers of security

A VPN (Virtual Private Network) secures one’s home or business network to allow traffic only from verified devices, or at least separates the unverified traffic out. IoT is making it easier for malicious hackers to access verified information through these devices. A VPN can prevent this, adding an additional layer of security.

As IoT takes over, the security aspect of it will require a great deal of thought, planning, coordination and action. Here are more tips for preparing for the future of IoT.

 

Filed Under: Cybersecurity, Risk and Compliance

About Secure360 and UMSA

The Secure360 and UMSA team is made up of professionals in the security and risk management industries. Topics of expertise range from physical security, IT, risk management, cybersecurity, cloud, information security and records management.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Categories

  • Uncategorized
  • Guest Posts
  • Business Continuity Management
  • News and Events
  • Physical Security
  • Cybersecurity
  • Professional Development
  • Risk and Compliance

latest tweets

  1. Secure360 Conference
    Secure360 Conference: Spots are filling fast & you don't want to miss these benefits! Register as a #Secure360 sponsor to show off the la… https://t.co/aqNcbZ25Ek
    about 2 days ago

  2. Secure360 Conference
    Secure360 Conference: Really interesting read from our Diamond #sponsor, @Cisco! Learn how to build #resiliency through a year of change https://t.co/GTWe6a0W3A
    about 2 days ago

  3. Secure360 Conference
    Secure360 Conference: We are partnering with @cioreview for #Sec360 coming up on May 11-12, 2021. #CIOReview is a technology magazine tha… https://t.co/RD0vKU5Vrn
    about 2 days ago

Footer

Contact

For more information about UMSA events, contact: Marie Strawser

Email List Signup

Join our email list for monthly Secure360 news and updates!




Join our tradeshow email list for updates on sponsorship opportunities and upcoming exhibitor deadlines.

Sponsored by:
© 2021 Secure360. All rights reserved.