Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Incorporating security into IoT – It is now or never

Michael Wallon, VP Sales M2M Asia Pacific, Gemalto | Aug. 13, 2014
Although IoT’s unprecedented degree of connectivity and automation can bring about immense convenience and business opportunities, it also presents cybercriminals with increasing opportunities to cause massive mayhem.

These security combinations can protect a system against a wide spectrum of threats, including eavesdropping of information, manipulation of data and impersonation of devices.

Importance of IoT Security

As IoT and M2M communications continue to proliferate, it is imperative for organizations to look beyond applications and understand that security is critical to their IoT solutions' success. A case in point is MedMinder's smart pill dispenser which automatically monitors a patient's medication usage and sends data over wireless networks to a central server[5]. Although this mHealth solution provides a great business case, attackers can easily use these devices to breach the central server if the necessary security protocols are not in place. The resulting theft of sensitive medical records can potentially cause more harm than the benefits of the product. That is why Medminder partnered with Gemalto to equip its mHealth solution with M2M security module. This ensures that personal information is protected and is only accessible by authorized individuals.

Just like how the continued success of the mHealth solution relies on secure data protection, the growth and adoption of IoT depends profoundly on the integration of security. Although the IoT phenomenon has the capability to transform our society and economy, connected equipment needs to be designed with security in mind in order for IoT to realize its potential. This is the most effective and efficient way for us to build security into every single IoT devices. Moreover, we will need to do it now, before everything around us is connected - and exploitable by cybercriminals.

[1] Source:

[2] Source:

[3] Source:

[4] Source:

[5] Source:



Previous Page  1  2 

Sign up for CIO Asia eNewsletters.