Page 18

18 _ C Y B E R S ECU R I T Y I N I oT _ R EI N FO R CE YO U R O N LI N E GUA R D D O G

BE AWARE

Everyone’s a cyber guardian Taking control of self-driving cars, stealing data from movement sensors, etc. The IoT makes cybersecurity more relevant than ever. It is a major challenge but also an opportunity. The difference between you and your competition? A reliable cybersecurity strategy.

Why are security risks increasing exponentially? The rising number of connected devices worldwide, from 20 billion to 30 billion by 2020, is generating more and more data of value to cybercriminals. In addition, the number of endpoints (i.e. vulnerable points) within one company network can reach millions these days, often with outdated devices which have little if any protection. What is more, the responsibility of the company does not end with the sale of a product, but continues throughout its entire life cycle. In the past, the contract between a company and its customer or product came to an end after a warranty period, for instance. Today, companies constantly generate data from their products and services and process information. Moreover, the nature of connected objects means that incidents not only pose a threat to the privacy of customers or companies. Cyberattacks can even cause health problems relating to pacemakers, for example. Are we lagging behind? In many companies, the idea prevails – albeit wrongly – that it is still too early to take precautions regarding the security risks of the IoT. In addition, there is often a great deal of uncertainty about responsibilities: if you distribute a product manufactured by your supplier – often in a different country – are you responsible for cybersecurity or are they? And if your company is responsible, which department should take care of this? Is it the IT department? Or customer services? Or is it a matter for sales?

FACTS Organizations that use cloud technology or the Internet of Things (IoT), report greater returns from the way they use cyber­ security.

IoT adopters report a 24% increase in financial benefits from having strong cybersecurity including improvements to their business agility.

‘Cybersecurity: The Innovation Accelerator’, a cybersecurity report by Vodafone

Cybersecurity in your business model IoT functionality is now a decisive factor at product level and impacts on your entire business model. In the near future, this will only be considered positive if the relevant cybersecurity aspects are under control, as well. Here are a few starting points to develop a fully-fledged IoT security approach: 1. I t is important to correctly assess the relevance of IoT security and to recognize and identify the main risks in advance. So it is sensible to chart the most likely attack scenarios. This information can then be used as a basis on which to develop a further strategy. Remember that an unprofessional response to an attack can cause more damage than the attack itself. Companies that suffer an IoT security problem do best to communicate this quickly, openly and transparently. 2. A minimum IoT security level is obviously necessary in any company department. But clear agreements must be made about the responsibilities as regards IoT security

Profile for Proximus

Proximus one q3 2017 en  

Businessmagazine for IT professionals

Proximus one q3 2017 en  

Businessmagazine for IT professionals