From data mining and machine learning to VR (virtual reality) and AI (artificial intelligence), the tech industry is no stranger to its fair share of buzzwords. One that has dominated headlines throughout 2016 is IoT, or the Internet of Things. To put it simply, the IoT refers to the flourishing ecosystem of devices connected to the Internet that can generate, consume and exchange data via embedded sensors. Mobile devices, our focus here at Tech Orchard, are a critical part of this ecosystem.

Though the IoT inherently offers a slew of potential benefits within this developing industry, security remains a critical concern. In fact, throughout the month of October, a number of DDoS (distributed denial of service) attacks, including one that hit a major Internet domain name server and knocked out access to a number of popular websites, including Twitter and The New York Times, surfaced. As more insecure, interconnected devices find their way to into the market, the insecurity of the IoT must be a focus of companies large and small across industries for 2017 and beyond.

While we are strong advocates for the integration of enterprise mobility management (EMM) and mobile threat prevention (MTP), there are other precautions that your company may want to consider taking to help prevent cybersecurity threats, end-user mistakes and other risks from becoming serious problems that impact a variety of your organization’s stakeholders, in addition to your reputation. According to a recent article from CIO, “Because IoT is a new field, it’s dominated by companies that don’t have the same mindset as the manufacturers of mission-critical servers — and that could spell trouble.”

  1. Digital video recorders and web cams that go unmonitored could be an easy target for hackers if you’re not careful.
  2. Fitness trackers and some wearables have been criticized for being built with a lack of security in mind, so be sure you address the use of these in your mobile device policies.
  3. Across your organization, it’s important IT recognize that updates are a moving target, and that IT staff be aware of and diligent about implementing patches.
  4. The increasing need for shared data can mean double the trouble if we’re not careful; be sure to clearly identify ownership, access and distribution rights to critical information.
  5. Audit power supplies in data centers, which typically run a Linux kernel that, like many IoT devices, are IP connected, and therefore a potential target for external threats.
  6. Consider restricting how and where IoT devices and the systems to which they’re attached can communicate, locking down anything that touches the internet.

With mobile devices and the IoT driving the industry forward, the risk and reward for incorporating them in the enterprise will likely continue to do battle. Rather than be fearful of the insecurity of the IoT, take measures into your own hands and lay the groundwork for creating a more proactive approach to security. From being vigilant and aware to adopting best practices and updating your usage policies frequently, only you can help your organization stay one step ahead of disaster and danger.