IoT Security Needs A Human Touch 

During Cyber Security Awareness Month this October, many cyber security professionals will be interested to know how their efforts are seen by the people directly impacted by them, according to a new survey for Utimaco a leading platform provider of cyber security and compliance solutions.

Utimaco develops cloud-based hardware solutions data protection and identity management and data intelligence solutions for regulated critical infrastructures.

Now, Utimaco's annual Circles of Trust survey has found there is a very high level of trust in financial services companies, but trust in Internet of Things (IoT) technology, both in terms of security and its ability to improve society, is typically much lower. 

These are two sectors, that although very different, directly impact consumers and newer ways of hacking are impacting both arenas:-

Worldwide, 64% of survey respondents had either absolute or some trust in financial institutions, while only 24% could define the term ‘Internet of Things’ and 57% are worried about the security of their home devices

While it is true that there have been hacks of smart devices, these are still rare, and criminals are far more likely to take funds directly from their victims through traditional scams and fraud. This means that there is an opportunity for the $320 billion dollar IoT industry to learn how to improve their own security from their peers in finance and banking.

They know from working with IoT that, while the industry isn’t without unique challenges, security is typically very high. The issue is not that IoT hardware and software developers aren’t creating secure systems, but that it is much more difficult for the users of these systems to see and feel these security systems in action. Compare this to the typical bank user’s experience of using a banking app, where they will have to log in with PINs or biometrics and confirm payments. 

Many IoT devices are designed to operate invisibly, at least when security is concerned, the network of sensors that enable smart cities or even something as simple as a smart light bulb conduct all of their security operations in the background.

Ultimaco recommends that IoT companies should emphasise the security aspects of their work and work to educate their end-users about how they can know that they are protected. "Cyber security awareness means more than awareness of the threats in your domain, it means an awareness of how end-users are experiencing security."

You Might Also Read:   

The US Security Standard For IoT Devices:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« SIM Swapping Cyber Crime 
DNA Testing Service 23andMe Hacked »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Digitus Biometrics

Digitus Biometrics

Digitus Biometrics is a market leader in biometric access control. We can secure access to any entry point, from the front door to the server rack cabinet.

44CON

44CON

44CON is an Information Security Conference & Training event taking place in London. Designed to provide something for the business and technical Information Security professional.

BMC Software

BMC Software

BMC provide solutions for IT service management, Cloud management, IT workload automation, IT operations, and mainframe system management.

ControlCase

ControlCase

ControlCase provide solutions that address all aspects of IT-GRCM (Governance, Risk Management and Compliance Management).

Deutsche Cyber-Sicherheitsorganisation (DCSO)

Deutsche Cyber-Sicherheitsorganisation (DCSO)

DCSO was founded in 2015 with the aim of counteracting the threats posed by globally organized cybercrime and state-controlled industrial espionage.

itWatch

itWatch

itWatch is focused on data loss prevention (DLP), endpoint security, mobile security, encryption, and cost reducing solutions for IT operations.

Positive Technologies

Positive Technologies

Positive Technologies is a leading global provider of enterprise security solutions for vulnerability and compliance management, incident and threat analysis, and application protection.

Hunters.AI

Hunters.AI

Hunters is the world's first autonomous hunting solution that leverages top-tier cyber expertise and AI to uncover hidden cyber threats.

CMMI Institute

CMMI Institute

CMMI Institute enables organizations to elevate and benchmark performance across a range of critical business capabilities, including product development, data management and cybersecurity.

RCDevs

RCDevs

RCDevs is an award-winning Software company providing security solutions designed for modern enterprise technologies and suited for SMEs to large corporations.

Risk Based Security (RBS)

Risk Based Security (RBS)

Risk Based Security provide the most comprehensive and timely vulnerability intelligence, breach data and risk ratings.

Onevinn

Onevinn

Onevinn's goal is to create a transparent, cost-effective security that is noticed as little as possible by the users. We simply call it "intelligent security."

Action1

Action1

Action1 is a Cloud-based lightweight endpoint security platform that discovers all of your endpoints in seconds and allows you to retrieve live security information from the entire network.

Neosec

Neosec

We’re reinventing API security. Understanding behavior requires data, analytics, and intelligence. Neosec brings XDR techniques to application security.

ViewDS Identity Solutions

ViewDS Identity Solutions

ViewDS Identity Solutions develops innovative identity software including cloud identity management solutions, directory services, access and authorization management solutions.

Grypho5

Grypho5

Grypho5 offers managed packages to protect where threat actors strike most. We defend your infrastructure dynamically, leaving you to focus on other priorities.