UK firms often unable to spot IoT security breaches
The majority of companies in the UK admit they would be unable to detect a security breach that originated in their Internet of Things (IoT) devices, a new study has revealed.
Research by Gemalto, which surveyed 950 IT and business decision makers around the world, found that overall, only 48 per cent said they had tools in place that would help them detect an IoT-based attack. However, for firms in the UK, the picture was even worse, with just 42 per cent able to spot a breach.
There is also a widespread desire for more information about the potential security implications of the IoT. Some four out of five firms (79 per cent) want more robust guidelines on IoT security, while (59 per cent) would like to see better clarification on who is responsible for protecting these tools.
However, with around 20 billion IoT devices set to be online around the world by the end of next year, businesses will have to act quickly to make sure their new technology does not pose a security risk.
Jason Hart, chief technology officer, data protection at Gemalto, said that given the huge increase in IoT devices at the moment, the survey findings are "extremely worrying".
He added: "With no consistent regulation guiding the industry, it's no surprise the threats – and, in turn, vulnerability of businesses – are increasing. This will only continue unless governments step in now to help industry avoid losing control."
The survey did find, however, that there is growing awareness about the implications of IoT. Spending on defences for this technology has grown from 11 per cent of IoT budgets in 2017 to 13 per cent today, while nine out of ten respondents agreed that this is a major consideration for customers.
Many people also believe that the IoT industry should be doing more. Nearly two-thirds of respondents (62 per cent) agreed that the security of devices needs to improve.
The biggest concern was that privacy would be compromised because of connected devices, which was named as an issue by 54 per cent of executives. Respondents also expressed worries about unauthorised parties like hackers controlling devices (51 per cent) and a lack of control over personal data (50 per cent).
Share This Post, Choose Your Platform!
With over 25 years in the business telecoms industry and an unrivalled reputation of delivering excellent, personal customer service, Arrow is one of very few companies in the UK able to provide a full telecoms, IT and energy consultancy and service proposition.
Savings through automation, scale, improved service. We’ve got that covered. But the true value comes with empathy, through empowerment, collaboration. It’s connecting people that drives us forward. It’s people that make tomorrow happen.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.