RG Internet of Things Tech Spotlight Nov 2019
RG Internet of Things Tech Spotlight Nov 2019
RG Internet of Things Tech Spotlight Nov 2019
TECHNOLOGY SPOTLIGHT
But that is changing. People are no longer chained to one location by cables connected to
servers that take up entire foors of ofce buildings. They can connect through nearly any
device that allows you to collect and exchange data. The power of the Internet and advance-
ments in wireless technologies have brought about the age of the Internet of Things.
Description
An IoT device is any computing device with the ability to transfer data over a network. TVs,
security cameras, appliances, light switches, and motion sensors for the home, or industrial
sensors, advanced radio-frequency ID (RFID) tags, beacons, and drones for businesses, are
all examples of IoT devices. According to Gartner, the Internet of Things (IoT) is a network
of dedicated physical objects (things) containing embedded technology for communicating
and sensing or interacting with their own internal states or the external environment. The
1 www.pwc.com/us/en/increasing-it-efectiveness/assets/future-of-the-internet-of-things.pdf
2 www.gartner.com/imagesrv/books/iot/iotEbook_digital.pdf
IntErnEt of thIngs 2
connecting of assets, processes and personnel enables the capture of data and events from
which a company can learn behaviour and usage through analytics, react with preventive
action, or augment or transform business processes. 2
Source: https://securityledger.com/2014/04/will-ot-big-data-create-darwinian-struggle-for-insurance-carriers/iot-loop/
Importance
With over 20 billion IoT devices expected by 2020,3 IoT devices will become embedded in our
lives and businesses. Appropriate use of IoT devices will support near-real-time data collection
and analysis that will lead to better and more timely data-driven decision making. In addi-
tion, the IoT will further enable automation and allow businesses to transform processes and
increase operational efectiveness (e.g., predictive maintenance). Already there are many real-
world applications for the IoT that can beneft businesses and consumers. These benefts are
not limited to specifc industries even though certain industries like manufacturing, agriculture,
retail and healthcare may be poised to beneft more than others.
3 www.zdnet.com/article/iot-devices-will-outnumber-the-worlds-population-this-year-for-the-frst-time/
IntErnEt of thIngs 3
• Automate process
4 www.pwc.com/us/en/industries/transportation-logistics/airlines-airports/predictive-maintenance.html
5 www.weforum.org/agenda/2015/06/what-are-the-business-benefts-of-the-internet-of-things/
IntErnEt of thIngs 4
IoT devices can serve as workfow triggers that initiate processes based on pre-set con-
ditions thereby eliminating the need for human intervention. For example, sensors can
detect the arrival of inventory at a warehouse and automatically collect and send the
relevant information to the inventory tracking system.
While there are numerous benefts to adopting IoT devices in business, there are still some
important risks to manage in order to efectively unlock the value of IoT:
IoT devices may increase • Treat IoT devices like other networked devices and imple-
security threats due to: ment appropriate encryption and end-point security.
• outdated software or • Where possible, contract equipment from known viable
frmware and reputable manufacturers or IoT service providers.
Ensure the existence of an appropriate update frequency
• lack of encryption to pro-
for device software/frmware.
tect transmitted data
• Change default administrative passwords from the manu-
• weak authentication
facturer to a password that complies with organizational
requirements
IT policies.
• default administrative
passwords.
IntErnEt of thIngs 5
IoT data stored in the cloud • Business should specify security and protection require-
may not be adequately pro- ments such as ensuring appropriate controls around
tected when managed by storage, transmission, and access as well as breach notif-
an IoT service provider. cation requirements.
• Service provider should agree to specifc requirements
for cloud security in a contractual agreement.
• Service provider should provide a third-party assurance
report on their cloud security and, if needed, privacy and
compliance with contractual obligations.
• Consider leveraging edge computing to process the IoT
data on a local device to eliminate the amount of sensi-
tive data being transmitted. For example, Apple’s FaceID/
TouchID data is stored on your device; user verifcation is
done locally without the data being transmitted back
to Apple servers for processing.
Network infrastructure may • Each IoT device will utilize a portion of available bandwidth
not support bandwidth on the network. As more devices are added to the IoT
demands from IoT devices. network, businesses must ensure adequate bandwidth is
available to support communication between these devices
and critical applications. Otherwise, network downtime
may reduce employee productivity or provide a negative
customer experience.
• Edge computing moves the processing of data generated
by IoT devices from the cloud back to the device, thereby
reducing bandwidth demands.
The IoT data breached may • Generally, stored data should be encrypted with personally
include personally identifable identifable information stripped out in order to minimize
information. the impact of information theft resulting from
a data breach.
• If personally identifable information is required to be
collected and stored, ensure compliance with local privacy
laws such as the Personal Information Protection and Elec-
tronic Documents Act (PIPEDA) in Canada and the General
Data Protection Regulation in Europe.
• Prepare a data breach response plan that should include
steps to:
— contain the breach
— evaluate the risks as a result of the breach
— notify impacted persons
— prevent future incidents
IntErnEt of thIngs 6
Employees may gain unau- • Create a separate private network for IoT devices that
thorized access of IoT devices are not shared with the network accessible by employee
through personal mobile devices.
devices.
• Ensure passwords for IoT devices are secure by changing
them from manufacturer defaults to forms that meet
organizational IT policies.
Employees may gain unautho- • Review IoT devices periodically to ensure outer casing
rized physical access to IoT has not been tampered with.
devices.
• Place IoT devices in locations where access controls are
secure and limited to authorized individuals.
• Review logs for IoT devices periodically and investigate
those where the device has gone ofine. Typically, to
maliciously tamper an IoT device would require bringing
it ofine and rebooting it.