About Us | Contact Us
View Cart

Internet of Things Expected To Place Increasing Burden on IT

By Vigilize | Tuesday, June 28, 2016 - Leave a Comment

An article review.


As the number of connected devices increases, IT Departments will face new challenges


ServIcons_ITAudit_01

The internet of things (IoT) promises a future of convenience for consumers, allowing them to control and monitor appliances, lighting and more throughout their homes from anywhere they can access the internet–but with this convenience can come security risks and extra costs. That is the opinion shared by researchers in an article published on CSO earlier this month, focusing on the burden that the IoT is expected to place on IT departments as their popularity rises.

The researchers quoted in the article go on to explain that IoT devices, comprising items as wide ranging as thermostats, refrigerators, light bulbs and door locks, have the potential to open networks to virtually unlimited attack vectors. Because many of these early devices have no way to update themselves vulnerabilities that are discovered may be permanent, and even with the ability to be updated in the field such updates may be slow to arrive because IoT manufacturers frequently lack backgrounds in technology.

Combine these risks with the typically lax attitudes that end users can have concerning technology and you have a situation where IT departments will have to devote an increasing amount of time to addressing IoT issues, and that will cost companies money: over half a billion dollars annually by 2018, according to sources quoted in the article.

There won’t be one single solution for organizations in the future either, according to the article. The experts quoted in the piece say the number and variety of IoT devices will create unique environments that will have to be addressed on an individual basis, and remind managers that, as always, complacency is the enemy.


Original article by Bob Violino writing for CSO.


same_strip_012513


 

Latest News
    Artificial intelligence carries risk, but so does organic ignorance … Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . At a recent conference, I noticed two camps emerging in the debate over artificial intelligence. Some people embrace AI as a tool, while others support Elon […]
    PRESS RELEASE – FOR IMMEDIATE RELEASE BUSINESS NEWS NEW EMPLOYEE FOR INFOTEX We are pleased to announce the appointment of Nathan Taylor as our new Network Administrator at infotex.  “We are very excited to have Nathan join our team as a Network Administrator and look forward to his contributions to maintaining and improving our infrastructure!” […]
    about artificial intelligence . . . And who will protect us from it . . .  Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Just watched some press on the the Senate hearings over regulating AI. The normal senator faces, Sam Altman of OpenAI, […]
    The Evolution of an Inside Term Used in our Vendor Risk Report Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Those who audit infotex know that our vendor risk report refers to a couple of our providers as “ransomware companies.” This reference started evolving […]
    Another awareness poster for YOUR customers (and users). Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Check out posters.infotex.com for the whole collection! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape) You are welcome to print out and distribute this around your […]
    New tools could allow unskilled attackers to launch increasingly sophisticated attacks… An article review. Imagine a world where you receive a call from your boss asking you to assist them with something… only it’s not your boss, but an AI being used by an attacker.  This isn’t science fiction, it’s an actual attack that has […]
    Unavailability Strikes Where it doesn’t matter anyway Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . So, I’m writing today’s article from a resort in the middle of Wisconsin.  I want to make sure I’m staying on top of my New Leaf, which is to […]
    . . . and the importance of segregated response. The latest edition of Executive Vice President, Michael Hartke’s article series! In 2007 when I first joined infotex, coming from small to medium sized business general IT support into the world of cybersecurity, the one thing that was very hard for me to internally rectify was […]
    How concerts can help us understand APTs . . . Especially if you use your imagination! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . My daughter reminded me of a concert Stacey and I attended way back in 2013, in Chicago.  It was one […]
    Mutiny! The Malicious Insider Threat Webinar Registration A Webinar-Video It is often awkward to bring up the one attack vector most of us have not addressed. The malicious insider threat. Even if we can flaunt all statistics and claim that the likelihood of an insider attack is low in our bank, the impact is still […]