The IoT “time bomb” report: 49 security experts share their views
Security

The IoT “time bomb” report: 49 security experts share their views

Everyone is talking about the Internet of Things (IoT). Connected devises are gaining traction in homes and businesses. The possibilities for what this will mean in our future are endless. And yet it is widely recognised that security is still a massive flaw and exposes a vast surface of things to attack.

But how big a problem is this and what can we do about it? Well, to find out we asked global security experts to get in touch with answers to these four key questions:

  1. How big a problem will lack of security on IoT devices be?
  2. What do big businesses fail to grasp about this?
  3. What can be done to rectify the problem?
  4. Anything else you want to add that you don't think gets enough media coverage in this area?

In response we received 50 pages (just under 25,000 words) from 49 different security experts. The short online report below distils the most interesting commentary. As there was some overlap in views this does not include direct quotes from every individual who took part but it does cover the overall message.   

Overview

Everyone we spoke to agreed that lack of security on IoT devices is a problem. Naturally, the scale of this depends on industry and the impact of the hack.

To continue reading...


Please login or register to view your article. If you do not have or do not remember your password, please click on the “Forgotten your password?” link at the bottom.
If you do not yet have a password but are an existing user, please use the “Forgotten your password?

PREVIOUS ARTICLE

«Forget 5G… Africa still hasn’t managed 4G yet

NEXT ARTICLE

Internet TV 2026 report: The 13 things to know »
author_image
Kathryn Cave

Editor at IDG Connect

  • twt
  • twt
  • Mail

Comments

no-images

Bruce Bading on August 09 2017

As my colleagues and I say in the ISACA, if you don't want to multi-factor smart phones, thermostats, printers, light bulbs and watches, you need to put your PCI CDE behind a segmented and strong multi-factor firewall to protect your crown jewels from IoT and obtain PCI DSS compliance.

no-images

Bruce Bading on August 09 2017

As my colleagues and I say in the ISACA, if you don't want to multi-factor smart phones, thermostats, printers, light bulbs and watches, you need to put your PCI CDE behind a segmented and strong multi-factor firewall to protect your crown jewels from IoT and obtain PCI DSS compliance.

Add Your Comment

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

Should companies have Bitcoins on hand in preparation for a Ransomware attack?