2020 computing

Page 4 of 3

The IoT Rundown For 2020: Stats, Risks, and Solutions

In 1999, Kevin Ashton coined the term “the Internet of Things.” However, the technology only gained momentum in 2011, after a Gartner report added it to the list of new emerging technologies. Since then, IoT gained global coverage, as more companies worked on advancing and applying it.

In the past, people referred to IoT as “embedded internet.” Today, IoT technology is embedded in many aspects of our lives. The most significant revelation of 2020 is, perhaps, the fact that many people know about IoT, but few understand the true meaning of the tech.

In this article, you’ll learn what IoT is, what are the risks it poses on your organization, and how to protect your network from IoT threats.

What Is the Internet of Things (IoT)?

IoT technology is an umbrella term that refers to connected physical and digital components. IoT components can transmit data without the assistance of human mediators. Each IoT component has a Unique Identifier (UID) that makes it recognizable.

There are currently five types of IoT applications:

  • Consumer IoT—such as light fixtures, home appliances, and voice assistance for the elderly.
  • Commercial IoT—applications of IoT in the healthcare and transport industries, such as smart pacemakers, monitoring systems, and vehicle to vehicle communication (V2V).
  • Industrial Internet of Things (IIoT)—includes digital control systems, statistical evaluation, smart agriculture, and industrial big data.
  • Infrastructure IoT—enables the connectivity of smart cities through the use of infrastructure sensors, management systems, and user-friendly user apps.
  • Military Things (IoMT)—application of IoT technologies in the military field, such as robots for surveillance and human-wearable biometrics for combat.

16 Internet of Things (IoT) Statistics

IoT technology enables users, systems, and devices, to connect to a wide range of networks, thus expanding the connectivity between the physical and the digital. As more organizations and governments make digital transformation a priority, the adoption of IoT technology increases. The below statistics show the continuous penetration of IoT technology.

How many IoT devices are installed worldwide:

  • In 2018—there were 7 billion IoT devices in 2018
  • In 2019—the number of active IoT devices reached 26.66 billion
  • Every second—127 new IoT devices are connected to the web
  • During 2020—experts estimate the installation of 31 billion IoT devices
  • By 2021—35 billion IoT devices will be installed worldwide
  • By 2025—more than 75 IoT devices billion will be connected to the web

Revenue for the IoT market:

  • In 2016—the global spending on the IoT was $737 billionv
  • In 2018—the North American IoT market generated $83.9 billion in revenue
  • During 2020—global spending on the IoT should reach $1.29 trillion
  • By 2021—the industrial IoT market size should reach $124 billion
  • By 2024—the global IoT healthcare market should reach $14 billion
  • By 2026—Experts estimate that the IoT device market will reach $1.1 trillion

IoT adoption predictions for 2020:

  • 93% of enterprises will adopt IoT technology
  • 80% of industrial manufacturing companies will adopt IoT technology
  • 90% of cars will be connected to the web through IoT technology
  • 3.5 billion cellular IoT connections will be installed

10 IoT Risks to Watch Out for in 2020

Here are the ten most pressing vulnerabilities according to the 2018 Open Web Application Security Project (OWASP) IoT Top 10:

  1. Weak, guessable, or hardcoded passwords—such as short, simple, and publicly available passwords.
  2. Insecure or unneeded network services—which are installed on the device and may expose data such as sensitive and financial information to theft and eavesdropping.
  3. Insecure ecosystem interfaces—external interfaces that connect to the device. The connection may compromise the device and its components.
  4. Lack of secure update mechanism—such as un-encrypted data moving from outward sources towards the device, and poor security monitoring.
  5. Use of insecure or outdated components—such as open-source and third-party components that weren’t scanned for vulnerabilities.
  6. Insufficient privacy protection—failure to protect private information that is stored on the device and connected ecosystems.
  7. Insecure data transfer and storage—such as the lack of access control and encryption during the movement of data.
  8. Lack of device management—on devices deployed in production; results in poor security support.
  9. Insecure default settings—the inability to fix insecure settings creates exploits in devices and systems.
  10. Lack of physical hardening—creates a larger attack surface, which threat actors can leverage to take control of a device or system.

This list will be updated during 2020, so keep an eye on the OWASP website.

3 Ways to Protect the Network from IoT

1. Monitor endpoints

IoT components complicate the security perimeter. The more IoT points you connect to the network, the more attack surface you add to the network. You can leverage Endpoint Detection and Response (EDR) cybersecurity to protect your network. EDR tools monitor endpoints, proactively look for threats, send alerts during security events, and respond when possible.

2. Scan devices for vulnerabilities

To prevent IoT devices from introducing vulnerabilities into the network, scan the device before enabling the connection. Performing vulnerability scans for devices and systems on a continuous basis can ensure the continued health of the network and its components.

3. Create a dedicated IoT a network

To keep your network secure, consider keeping it segregated from IoT components. You can do so by creating a wireless network dedicated for IoT. This network should have access to the Internet, but not to the corporate network.

Conclusion

IoT devices are set to be embedded in every aspect of our lives. From home appliances to healthcare devices, transport technology, industrial networks, and military weapons. IoT technology enables digital transformation. As more industries undergo digitalization, more IoT devices will be installed and connected to networks.

Whether you’re responsible for the security of a network, or the security of your personal device—you should take IoT security seriously. Hackers can easily take advantage of IoT devices for nefarious reasons. Hopefully, this article has helped you to better understand IoT technology, and how you can protect against IoT vulnerabilities.

About the Author

Gilad David Maayan is a technology writer who has worked with over 150 technology companies including SAP, Imperva, Samsung NEXT, NetApp and Ixia, producing technical and thought leadership content that elucidates technical solutions for developers and IT leadership. Today he heads Agile SEO, the leading marketing agency in the technology industry.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3