Menu

IoT FEATURE NEWS

Grappling With Growing 'Insecurity of Things'

By

I have never seen a situation quite like it in my 22 years in the high tech industry.

I am referring to the sudden and more intense focus by executives on data security, digital trust, and intrusion protection.  During my meetings with clients in the past six months, discussions invariably shift to these topics. As breaches of corporate security have become more frequent and serious, security has ascended to the top of high tech corporate agendas.

These serious challenges are becoming critical for the industry to solve. If not addressed comprehensively, quickly and systematically, these hurdles could hinder innovation, risk-taking and market growth.

Main security concerns
Currently, executives are more concerned about the security and use of corporate data by their extended network of partners. They are increasingly preoccupied with how, where, when and why electronic devices get stored, shared and analyzed. They are also becoming more vigilant about which of their customers’ devices are used for which applications, what services get delivered to whom, and at whose expense.

Recent Accenture research underscores similar concerns among consumers. Summarized in a report titled Engaging the Digital Consumer in the Connected World, the research finds that more than half (54 percent) of consumers are not always confident about the security of their personal data on the Internet.

Concerns among both audiences could stem in part from rapid market growth across industries in the Industrial Internet of Things and Internet of Things, which target businesses and consumers, respectively. In these markets, there will continue to be widespread sharing of larger amounts of data on a growing number of devices used by more people. As this happens, managing the complexity of security will become a more massive and arduous undertaking that should be at the heart of corporate strategies.

Few high tech products have enough security
Few high tech products have been designed from the start with enough security. This fact escapes many business leaders. As a result, many companies expect to run high-integrity applications on what they don’t realize are low-integrity devices, applications, and networks. These devices have a number of open interfaces with communication access vulnerabilities that heighten security risks.

In today’s markets, where every business is a digital business and every consumer a digital consumer, rarely is one company responsible for robust security throughout the ecosystem. This goal requires an abundance of collaboration, sharing and trust.

Steps to take
To address these challenges, high tech companies should consider taking these actions:

1) Nominate a chief security officer if they have not already
Companies should consider nominating a chief security officer with a direct reporting relationship to the CEO. This officer would attend meetings where senior leaders make major strategic decisions to provide recommendations for the company’s security and data privacy direction. The key is to have a chief security officer with a dedicated budget and ownership of corporate security. Accenture addresses this issue and others in a new report titled The Cybersecurity Leap: From Laggard to Leader.

2) Evaluate product and service security risks
Many companies are using development and operational approaches in which software development methods focus on collaboration, communication, and automation between software developers and other IT professionals. These companies tend to automate and use instruments as much as possible, which gives them a competitive advantage when integrating security seamlessly into product development.

More security needs to be built into each high tech product when it is designed. And security should protect a high tech company’s products while adhering to ecosystem security requirements in which that product will be used.

3) Use proactive product testing methods
Companies should perform proactive security tests on products to prepare for breaches. Tests should anticipate what could go wrong and take steps to avoid them. For example, companies should do active penetration testing that tries to hack into their own products. The goal should be to find security vulnerabilities so they can be preemptively fixed.

Final thoughts
By taking these steps, companies can strengthen security strategies to build digital trust, which is all about consumers believing the company will protect their personal data. Digital trust is the high tech currency that should be traded and invested in to help gain competitive differentiation and aspire to high performance.

Once companies gain digital trust, they will be able to take advantage of IoT business and technology opportunities with more confidence. They can access more consumer data from those who trust them, use analytics to unlock more value from that data, deepen customer loyalty, and offer more revenue-generating services and applications.

Sami Luukkonen is the global managing director for Accenture’s Electronics & High Tech industry group. He can be reached at [email protected].




Edited by Dominick Sorrentino
Get stories like this delivered straight to your inbox. [Free eNews Subscription]


SHARE THIS ARTICLE
Related Articles

Rising Edge Computing Investments to Reach $350B by 2027, According to IDC

By: Alex Passett    3/27/2024

Worldwide spending on edge computing is expected to surge (and then keep going) for the foreseeable future, according to the International Data Corpor…

Read More

ZEDEDA Adds Lisa Edwards as New Board Member, Seeks Opportunities to Strengthen Operations and Scale

By: Alex Passett    3/26/2024

Earlier this morning, ZEDEDA announced the addition of Lisa Edwards to its board of directors.

Read More

An Existing IoT Collab, Emboldened: Digi International and Telit Cinterion Transform Solutions with 5G RedCap Integration

By: Alex Passett    3/25/2024

The ongoing industry collaboration between Digi International and Telit Cinterion signals strong support for the mainstream showcasing of 5G for IoT a…

Read More

Telit Cinterion's 5G LGA Modules, Powered by Snapdragon from Qualcomm, to Create a Big Leap in IoT Connectivity

By: Alex Passett    3/25/2024

Telit Cinterion recently unveiled its FE990B34/40 LGA family of modules, powered by the Snapdragon X72 5G Modem-RF System from Qualcomm Technologies, …

Read More

Embracing Innovation in Mining: The Role of Network-Aware Applications in the Digital Transformation

By: Special Guest    3/21/2024

Shabodi leverages private 5G network capabilities and enables the development of network-aware applications to enhance operational efficiency, automat…

Read More