Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

New Research Unveils Corporate Losses Associated with IoT-Related Security Missteps

DigiCert’s 2018 State of IoT survey reveals security as the top concern as IoT takes center stage with 92 percent of companies saying it will be extremely important in the next two years

A new study from DigiCert, Inc., the world’s leading provider of TLS/SSL, PKI and IoT security solutions, reveals that enterprises have begun sustaining significant monetary losses stemming from the lack of good practices as they move forward with incorporating the Internet of Things (IoT) into their business models. In fact, among companies surveyed that are struggling the most with IoT security, 25 percent reported IoT security-related losses of at least $34 Million in the last two years.

These findings come amid a ramping up of IoT focus within the typical organization. Eighty-three percent of respondents indicated that IoT is extremely important to them currently, while 92 percent said they anticipate IoT to be extremely important to their respective organizations within two years.

Read More: Interview with Ben Goertzel, CEO at SingularityNET

The survey was conducted by ReRez Research in September 2018, with 700 enterprise organizations in the US, UK, GermanyFrance and Japan from across critical infrastructure industries.

Top concerns

Security and privacy topped the list of concerns for IoT projects, with 82 percent of respondents stating they were somewhat to extremely concerned about security challenges.

“Enterprises today fully grasp the reality that the Internet of Things is upon us and will continue to revolutionize the way we live, work and recreate,” said Mike Nelson, vice president of IoT security at DigiCert. “Securing IoT devices is still a top priority that many enterprises are struggling to manage; however, integrating security at the beginning, and all the way through IoT implementations, is vital to mitigating rising attacks, which can be expected to continue. Due diligence when it comes to authentication, encryption and integrity of IoT devices and systems can help enterprises reliably and safely embrace IoT.”

Read More: Palo Alto Networks Appoints Amit K. Singh as President

Top vs. bottom performers

To give visibility to the specific challenges enterprises are encountering with IoT implementations, respondents were asked a series of questions using a wide variance of terminology. Using standard survey methodology, respondents’ answers were then scored and divided into three tiers:

  • Top-tier: Enterprises experiencing fewer problems and demonstrating a degree of mastery mitigating specific aspects of IoT security.
  • Middle-tier: Enterprises scoring in the middle range in terms of their IoT security results.
  • Bottom-tier: Enterprises experiencing more problems that were much more likely to report difficulties mastering IoT security.

Read More: Interview with Angel Gambino, CEO and Founder of Sensai

IoT security missteps

Respondents were asked about IoT-related security incidents their organizations experienced within the past two years. The difference between the top- and bottom-tiers was unmistakable. Companies struggling the most with IoT implementation are much more likely to get hit with IoT-related security incidents. Every single bottom-tier enterprise experienced an IoT-related security incident in that time span, versus just 32 percent of the top-tier. The bottom-tier was also more likely to report problems in these specific areas:

  • More than six times as likely to have experienced IoT-based Denial of Service attacks
  • More than six times as likely to have experienced Unauthorized Access to IoT Devices
  • Nearly six times as likely to have experienced IoT-based Data Breaches
  • 4.5 times as likely to have experienced IoT-based Malware or Ransomware attacks

These security incidents were not trivial. Among companies surveyed that are struggling the most with IoT security, 25 percent reported IoT security-related losses of at least $34 Million in the last two years.

Read More: Interview with Jeffrey Kofman, CEO and Founder at Trint

The top five areas for costs incurred within the past two years were:

  • Monetary damages
  • Lost productivity
  • Legal/compliance penalties
  • Lost reputation
  • Stock price

Read More: The Top 5 “Recipes” That Give AI Projects a Higher Likelihood of Success

Meanwhile, although the top-tier enterprises experienced some security missteps, an overwhelming majority (almost 80 percent) reported no costs associated with those missteps. Top-tier enterprises attributed their security successes to these practices:

  • Encrypting sensitive data
  • Ensuring integrity of data in transit
  • Scaling security measures
  • Securing over-the-air updates
  • Securing software-based encryption key storage

“When it comes to accelerating implementations of IoT, it’s vital for companies to strike a balance between gaining efficiencies and maintaining security and privacy,” Nelson said. “This study shows that enterprises that are implementing security best practices have less exposure to the risks and resulting damages from attacks on connected devices. Meanwhile, it appears these IoT security best practices, such as authentication and identity, encryption and integrity, are on the rise and companies are beginning to realize what’s at stake.”

Read More:  Fluor Uses IBM Watson to Deliver Predictive Analytics Capability for Megaprojects

Recommendations

The survey points to five best practices to help companies pursuing IoT realize the same success as the top-tier performing enterprises:

  1. Review risk: Perform penetration testing to assess the risk of connected devices. Evaluate the risk and build a priority list for addressing primary security concerns, such as authentication and encryption. A strong risk assessment will help assure you do not leave any gaps in your connected security landscape.
  2. Encrypt everything: As you evaluate use cases for your connected devices, make sure that all data is encrypted at rest and in transit. Make end-to-end encryption a product requirement to ensure this key security feature is implemented in all of your IoT projects.
  3. Authenticate always: Review all of the connections being made to your device, including devices and users, to ensure authentication schemes only allow trusted connections to your IoT device.  Using digital certificates helps to provide seamless authentication with binded identities that are tied to cryptographic protocols.
  4. Instill integrity: Account for the basics of device and data integrity to include secure boot every time the device starts up, secure over the air updates, and the use of code signing to ensure the integrity of any code being run on the device.
  5. Strategize for scale: Make sure that you have a scalable security framework and architecture ready to support your IoT deployments. Plan accordingly and work with third parties that have the scale and expertise to help you reach your goals so that you can focus on your company’s core competency.

Read More: The AI Gold Rush: How to Make Money off AI and Machine Learning!

20 Comments
  1. Copper scrap safety measures says

    Environmental copper recycling Copper scrap trade policies Metal recuperation yard
    Copper cable scrap repurposing, Metal trade insurance, Copper scrap circular economy

  2. Metal recycling recovery yard Ferrous material valuation Iron scrap recovery and repurposing

    Ferrous scrap reclamation center, Iron reclaiming services188. Scrap metal reclaiming facility, Metal recovery processing

  3. For most up-to-date news you have to pay a visit world wide web and on internet I found this website as a most excellent web site for most recent updates.

  4. глаз бога бот says

    Hi this is somewhat of off topic but I was wondering if blogs use WYSIWYG editors or if you have to manually code with HTML. I’m starting a blog soon but have no coding knowledge so I wanted to get advice from someone with experience. Any help would be greatly appreciated!

  5. cs 2 g******* sites 2024 says

    Link exchange is nothing else but it is simply placing the other person’s website link on your page at proper place and other person will also do same for you.

  6. University says

    Крупный учебный и научно-исследовательский центр Республики Беларусь. Высшее образование в сфере гуманитарных и естественных наук на 12 факультетах по 35 специальностям первой ступени образования и 22 специальностям второй, 69 специализациям.

  7. Having read this I thought it was very informative. I appreciate you finding the time and effort to put this information together. I once again find myself spending a significant amount of time both reading and leaving comments. But so what, it was still worth it!

  8. Hi, always i used to check webpage posts here early in the morning, since i love to learn more and more.

  9. An intriguing discussion is worth comment. I think that you should write more on this subject, it might not be a taboo subject but generally people don’t speak about such subjects. To the next! All the best!!

  10. hot fiesta слот says

    Ahaa, its good conversation about this article here at this weblog, I have read all that, so now me also commenting here.

  11. Thanks to my father who shared with me about this weblog, this blog is in fact awesome.

  12. 7k казино вход says

    First off I want to say great blog! I had a quick question in which I’d like to ask if you don’t mind. I was curious to know how you center yourself and clear your mind before writing. I have had a tough time clearing my mind in getting my thoughts out. I do enjoy writing but it just seems like the first 10 to 15 minutes are usually wasted just trying to figure out how to begin. Any ideas or tips? Thanks!

  13. 7k казино telegram says

    Hi there! I just wanted to ask if you ever have any problems with hackers? My last blog (wordpress) was hacked and I ended up losing months of hard work due to no backup. Do you have any solutions to protect against hackers?

  14. Теннис онлайн says

    I delight in, lead to I found exactly what I used to be taking a look for. You have ended my 4 day long hunt! God Bless you man. Have a nice day. Bye

  15. Write more, thats all I have to say. Literally, it seems as though you relied on the video to make your point. You clearly know what youre talking about, why waste your intelligence on just posting videos to your site when you could be giving us something enlightening to read?

  16. “Франшиза автомойки” от нашей сети – это готовое решение для старта вашего бизнеса. Мы предлагаем полную поддержку и профессионализм.

  17. Appreciate the recommendation. Will try it out.

  18. Джак says

    I love your blog.. very nice colors & theme. Did you create this website yourself or did you hire someone to do it for you? Plz reply as I’m looking to create my own blog and would like to know where u got this from. kudos

  19. theguardian says

    This is the right website for anybody who wishes to find out about this topic. You understand so much its almost hard to argue with you (not that I actually would want toHaHa). You definitely put a brand new spin on a topic that’s been written about for years. Excellent stuff, just great!

  20. Anonymous says

    I love to meet new people and have fun with them. I like to chat, free adult live chat in front of the cam and shoot clips. I am open for new adventures 🙂

Leave A Reply

Your email address will not be published.