Gaining 360 Degree View of Consumers
Predicting a Better Future for Students
The Changing Dynamics of Engineering Industry
CIO ... Only Until the Next Data Breach
Embrace Technology to Stay Ahead!
Dave Doyle, CIO & SVP - IT, Regal Entertainment Group
The Changing Role of the CIO
Mel Kirk, SVP & CIO, Ryder System, Inc.
Effective Strategy While Implementing SAP or ERP Systems
Daniel M Horton, CIO, Michael Baker International
Leveraging Data as an Enterprise Asset
Renee P Wynn, CIO, NASA
Ensuring Security in the IoT era
Under the IoT umbrella comes a huge range of interconnected devices and applications, ranging from CCTV to IP connectivity to wearables that accumulate and generate cascades of data. Although IoT devices have improved connectivity to a great extent, the unavoidable question that persists is—why and how IoT poses security concerns for individuals and enterprises alike? With the sheer amount of data at disposal, IoT devices provide an easy entry for data intruders and hackers. Owing to the connectivity of these devices to the internet, the impact of a compromised appliance can prove detrimental to users’ privacy. While large-scale enterprises and safety-critical systems often have the resources—security experts and capital—to fortify their IoT devices, even something as simple and cost-effective as a smart refrigerator can be hacked into by malicious bad actors. Even if the data from IoT tools are in the cloud, the prospect of hackers gaining access to that data must be considered.
IoT devices such as smartphones, tablets, watches, and even heating systems are often easily accessible and vulnerable that can enable access to the IoT network. For instance, PIN code phishing could provide access to a device that contains an app, which is connected to the IoT system. Ensuring efficient data security and data access to only authorized users are imperative to avert data intrusions. Security codes must be well protected and discreet. Any code alteration must be detected instantly and should be permitted to only authenticated users. Moreover, it’s essential to determine if the connected devices are authentic and inspect if their critical functionality tampers. Thus, strong authentication and cryptographic key protection are key to securing IoT devices and the data that they aggregate.