Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Southeast Asia does not prioritise IoT security

Anuradha Shukla | March 2, 2016
May attract attackers in future, according to Intel Security.

IoT Security is not yet a priority for Southeast Asian countries, according to a new study by Intel Security.

Although businesses in this region understand the changing security landscape, they prefer using advanced security technology to safeguard against the evolving threats from IoT adoption.

Thailand ranked lowest in its IoT security awareness of the countries surveyed (Singapore, Malaysia, Thailand, Indonesia and Philippines).

Only 39 percent of IT leaders recognised the need for enhancements to be made to their security controls to secure their IoT. At 53 percent, Philippines ranked highest as the most aware nation in IoT security awareness.

"Security is an important aspect of IoT that needs to be addressed urgently. Intel Security predicts that these systems will reach substantial enough penetration levels that they will attract attackers," said Craig Nielsen, managing director, South East Asia, Intel Security. "With the evolving threat landscape, security needs to cut across the entire IoT spectrum, whether it is protecting devices, putting in access control measures, writing security codes, or looking at security from a policy perspective."

High mobile penetration

At 42%, Singapore was the country with the highest mobile penetration globally. Malaysia and Indonesia stood at 46 percent and 40 percent respectively.

Growing vulnerabilities arising from new technologies such as DDoS attacks and spammed devices are said to open up new possibilities to hackers and cybercriminals.

Intel Security recommends that organisations should adopt a secure and holistic solution for information-rich environments across multiple environments and devices.

Organisations should also support industry standards and device interoperability as well as display the ability to solve Information Technology/Cloud services challenges in connecting legacy and new systems to new and future services.

"Effective static and dynamic analysis tools, along with cloud-based threat intelligence, are key to analysing files to gauge whether they are benign or malicious," added Nielsen. "Intel Security believes that technology vendors and vertical solution providers will need to work cohesively to establish user safety guidance and industry best practices, as well as build security controls into device architectures wherever appropriate." 


Sign up for CIO Asia eNewsletters.