The industrial or enterprise Internet of Things (IoT) may not get the news time like its commercial countertparts, but that doesn't mean that security is any less of an issue. Similar to the threat of hackers taking over your lights, locks, thermostats or Amazon Echos, industrial facilities are also at risk, including places like energy grids, one of which was recently hacked leaving residents without power for hours in the Ukraine.
The issue of security within IoT as a whole will continue to grow. At least, that's what security expert Ted Harrington, partner at Independent Security Evaluators and organizer of the annual DEFCON hacker conference, recent said. Harrington noted "New technology follows three predictable steps ... First, someone innovates. Second, developers flood the marketplace with similar products without considering security implications. Third, the security community convinces the industry to tighten up security." Harrington's thesis is strengthened by the fact that the US Homeland Security is getting serious about IoT security, specifically device detection, authentication and updates.
RESOLUTE Partner's VP of Technology, Frank DeMasi elaborates on the device security issue by saying "IoT needs some kind of central control mechanism so that all these devices and their conversations can be managed and approved. Right now vendors designing devices and their “conversations” with other devices are designed to happen automatically to add functionality and in some cases relevance to their product. For the enterprise security or home residence router manager this is a nightmare scenario in management, let alone security. If the government standardized on a communication platform (think like Wi-Fi) then not only can device manufacturers make devices to talk to each other, but other manufacturers will then make the central control devices with security. Right now we have the first one and nothing for the second because of a lack of standardization in the market space."
If you're interested in learning more about how we facilitate this type of work, especially security, read the free case study below.