• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

Critical Sudo bugs expose major Linux distros to local Root exploits

 | 

Google fined $314M for misusing idle Android users' data

 | 

A flaw in Catwatchful spyware exposed logins of +62,000 users

 | 

China-linked group Houken hit French organizations using zero-days

 | 

Cybercriminals Target Brazil: 248,725 Exposed in CIEE One Data Breach

 | 

Europol shuts down Archetyp Market, longest-running dark web drug marketplace

 | 

Kelly Benefits data breach has impacted 550,000 people, and the situation continues to worsen as the investigation progresses

 | 

Cisco removed the backdoor account from its Unified Communications Manager

 | 

U.S. Sanctions Russia's Aeza Group for aiding crooks with bulletproof hosting

 | 

Qantas confirms customer data breach amid Scattered Spider attacks

 | 

CVE-2025-6554 is the fourth Chrome zero-day patched by Google in 2025

 | 

U.S. CISA adds TeleMessage TM SGNL flaws to its Known Exploited Vulnerabilities catalog

 | 

A sophisticated cyberattack hit the International Criminal Court

 | 

Esse Health data breach impacted 263,000 individuals

 | 

Europol dismantles €460M crypto scam targeting 5,000 victims worldwide

 | 

CISA and U.S. Agencies warn of ongoing Iranian cyber threats to critical infrastructure

 | 

U.S. CISA adds Citrix NetScaler flaw to its Known Exploited Vulnerabilities catalog

 | 

Canada bans Hikvision over national security concerns

 | 

Denmark moves to protect personal identity from deepfakes with new copyright law

 | 

Ahold Delhaize data breach affected over 2.2 Million individuals

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Breaking News
  • Hacking
  • Internet of Things
  • Top Security Priorities of the Internet of Things

Top Security Priorities of the Internet of Things

Pierluigi Paganini August 05, 2016

The rise of the Internet of Things is being heralded by many as the beginning of a new Industrial Revolution.

Technology firms are now linking objects ranging from household appliances to industrial machinery to the internet. With telecommunications firms on board, manufacturers are coming up with new, innovative uses for everyday objects. Yet linking these everyday objects to a wider network out there creates new security risks.

How do you cope with the massively increased flow of data that the Internet of Things requires? At the moment there are already a forecasted amount of 6.4 billion connected objects, but as this technology takes off this number will easily reach into the 11 billion by 2020. As a result, some new priorities are beginning to emerge.

Internet of Things

Security begins with the object

When a staggering volume of new objects become connected to the internet, some form of security must be built in at the manufacturing level. This is a shift that’s one of the first major new priorities for the IoT. The shift will most likely move in stages, with the web service focused on first as a security barrier. Cloud security is also important to think about. Yet as IoT innovation from Nokia Networks and other providers continues to develop, the security will eventually become embedded directly into the object.

Securing data en route

Another area where security experts will need to focus is in the route that data takes from the object to the internet. There’s a far greater burden on IT departments with the growth of the IoT, as they must now track exponentially increasing volumes of data. Endpoint security is often focused on, but these mass flows of data must also be secured during transport as a new priority. Data is currently sent to a local data collation hub in many cases, where it is stored before it’s moved on to the next end point. These midway storage points must be secured just like the end points. Securing the endpoints is still important however, as is educating end users who may pose the biggest security risk.

Privacy issues

Privacy is another major security issue to consider with the growth of the IoT. Naturally, privacy concerns are already a core issue with cloud systems, but this will grow as every person and object starts transmitting data. Objects will constantly be collecting and aggregating data in real time, which must be stored securely for review.

Systems will need to be put into place to determine how to best delete this data when it is no longer needed. Useful connected objects like health monitors will store sensitive information about consumers, for example. This is a major component of the security puzzle that needs to be addressed before the IoT can become mainstream.

Increasing Security Spending

With everything from industrial machinery to consumer vehicles connected to the web, the consequences of a security breach could be serious. As the IoT becomes increasingly complex over the next few years, stretching out to become a technology in every individual’s home, directing entire smart cities, the consequences of an attack could be considerable. To combat this, IoT security spending has increased rapidly to match the technology’s growth. A recent Gartner report stated that worldwide spending will reach $547 million in 2018, up from $348 million this year and $281.5 million in 2015.

The growth of this new technology will offer society numerous benefits, but it’s important to think about embedding security right from the start. Identifying these priorities and increasing security spending accordingly is a good start.

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(Security Affairs – security, Internet of Things)

[adrotate banner=”5″]

[adrotate banner=”13″]


facebook linkedin twitter

Hacking Internet of Things IoT privacy

you might also like

Pierluigi Paganini July 04, 2025
Critical Sudo bugs expose major Linux distros to local Root exploits
Read more
Pierluigi Paganini July 04, 2025
Google fined $314M for misusing idle Android users' data
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    Critical Sudo bugs expose major Linux distros to local Root exploits

    Security / July 04, 2025

    Google fined $314M for misusing idle Android users' data

    Laws and regulations / July 04, 2025

    A flaw in Catwatchful spyware exposed logins of +62,000 users

    Malware / July 04, 2025

    China-linked group Houken hit French organizations using zero-days

    APT / July 03, 2025

    Cybercriminals Target Brazil: 248,725 Exposed in CIEE One Data Breach

    Data Breach / July 03, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT