

{"id":125571,"date":"2020-01-22T09:37:20","date_gmt":"2020-01-22T04:07:20","guid":{"rendered":"https:\/\/analyticstraining.com\/?p=15679"},"modified":"2020-06-11T15:34:56","modified_gmt":"2020-06-11T10:04:56","slug":"using-the-iot-to-bolster-operational-security","status":"publish","type":"post","link":"https:\/\/www.jigsawacademy.com\/using-the-iot-to-bolster-operational-security\/","title":{"rendered":"Using the IoT to Bolster Operational Security"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">As the nascent Internet of Things enters its adolescence, <\/span><a href=\"https:\/\/analyticstraining.com\/4-biggest-opportunities-for-iot-innovation\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">it stands to prove transformational across entire industries<\/span><\/a><span style=\"font-weight: 400;\">, but it\u2019s already possible to implement IoT technology to great effect if the circumstances justify the early adoption. One area that certainly justifies it is security: more than ever before (following various high-profile cases of data theft), there\u2019s great reason to be concerned about the safety and privacy of business data.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Using the IoT, a forward-thinking business can greatly reinforce its security procedures without markedly decreasing convenience \u2014 in fact, you may see an <\/span><i><span style=\"font-weight: 400;\">increase <\/span><\/i><span style=\"font-weight: 400;\">in convenience in some areas. But how does this work? What specifically does the IoT help with?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Let\u2019s find out. Here are some essential things that IoT tech can bring to operational security, along with a notable point of caution about implementation:<\/span><\/p>\n<h2><b>Convenient multi-factor authentication<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Authentication gets more important the larger an operation becomes and the more moving parts it requires. On a frequent basis, users must be identified (and have their access levels gauged), and products must be confirmed as genuine.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Traditionally, this has mostly been done manually \u2014 when an employee lacks the expertise to verify something, they must pass the matter up the managerial chain until it reaches someone with sufficient authority. This takes time and effort that would be better used elsewhere.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Through bringing together <\/span><a href=\"https:\/\/www.gemalto.com\/govt\/inspired\/biometrics\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">biometrics<\/span><\/a><span style=\"font-weight: 400;\">, chips with unique identifiers, and decentralized records, the IoT can enable complex multi-factor authentication. To verify a user\u2019s identity, for instance, it can use a fingerprint reading, a voice scan, <\/span><i><span style=\"font-weight: 400;\">and <\/span><\/i><span style=\"font-weight: 400;\">a password. <\/span><a href=\"https:\/\/www.symantec.com\/blogs\/feature-stories\/blackhat-2019-researchers-find-way-fool-biometric-authentication\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Per Tencent\u2019s recent research<\/span><\/a><span style=\"font-weight: 400;\">, this technology is still far from foolproof, but it\u2019s getting better all the time.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Think about the level of security that\u2019s now almost mandatory for financial services (e.g. full internal GDPR compliance, adhere to PCI standards across the board, and risk teams assembled to prevent fraud), and envision that encompassing <\/span><i><span style=\"font-weight: 400;\">every <\/span><\/i><span style=\"font-weight: 400;\">form of device or system interaction. Will that be overkill in most situations? Absolutely, but the point is that it can easily scale to that level if needed \u2014 all without expanding the manual work required (past the design and production stage, at least).<\/span><\/p>\n<h2><b>Cloud-supported video monitoring<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Depending on the exact nature of your business, you may have numerous parts of your operation that you would like to monitor closely if possible. You may have part-time employees working around high-value items, for instance, or find that a certain part of your operation isn\u2019t making progress as efficiently as it should.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Before the cloud came along, video monitoring could be very inconvenient. Data storage would be bulky and require you to manually swap out tapes when needed \u2014 plus the tapes would be vulnerable to local access and manipulation.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With cloud-based storage, though, video footage can be seamlessly streamed to secure servers elsewhere in the world. This also makes monitoring equipment easier to deploy, and thus easier to justify. Instead of having to deal with permanent installations, you can simply configure wireless cameras when you need them and move them afterwards.<\/span><\/p>\n<h2><b>Sophisticated geo-tracking<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Geo-tracking certainly isn\u2019t new, but it\u2019s still far from reaching its potential for business. It\u2019s often vague, limited, inconsistent, and difficult to access when you most need it (barring notable exceptions such as <\/span><a href=\"https:\/\/www.masterphonephotography.com\/find-my-lost-phone-how-to-find-a-lost-apple-or-android-phone\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">\u201cFind my Phone\u201d-style emergency theft features<\/span><\/a><span style=\"font-weight: 400;\">). This is something that the IoT will change.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Through a combination of GPS information, mobile data signals, Wi-Fi networks, RFID tags, and Bluetooth connections (to name just some viable factors), it\u2019s possible to clearly and accurately track the location of a product even when individual data points are lost. T<\/span><span style=\"font-weight: 400;\">he goal is essentially to create a system that\u2019s not only automated but also <\/span><i><span style=\"font-weight: 400;\">adaptive<\/span><\/i><span style=\"font-weight: 400;\"> \u2014 healing itself when damage is detected.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Why is this useful for security? Well, when you have something moving through an extended supply chain, you need guaranteed consistency. It costs no small amount of money to take a concept and turn it into a practical reality, and even if a product drops off the grid for just a small amount of time, it invites reasonable concerns about fraud.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Think about top-end paintings. With adequate tracking (combined with all these other points), they wouldn\u2019t need dedicated art appraisers to verify their legitimacy, saving money and time. And if any damage occurred, it would be easy to tell at which point in the distribution chain it took place, making it simple to attribute responsibility.<\/span><\/p>\n<h2><b>Varied lines of communication<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Regardless of how much of your operation becomes automated, communication will still be of critical importance. In fact, given <\/span><a href=\"https:\/\/www.fastcompany.com\/90318974\/the-rise-of-remote-working-will-continue\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">the rise of remote working<\/span><\/a><span style=\"font-weight: 400;\"> in a time when it doesn\u2019t always matter where a business is actually located, it\u2019s essential to be able to follow along with what workers are doing \u2014 no matter where they are in the world.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For instance, suppose that someone in possession of an expensive piece of equipment seems to disappear at a very inconvenient time: what can be done about it? Previously, you could call them repeatedly and send them some messages. With the IoT, you can do more.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you had an employee working on a mission-critical task, you could tag <\/span><i><span style=\"font-weight: 400;\">everything <\/span><\/i><span style=\"font-weight: 400;\">they had with them. If you were unable to reach them, you could glean their location using GPS technology, find a nearby business, and send a message there to intercept them.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">And when they needed to give a full account of the situation, they could do so using their phone, or a smartwatch, or any other suitable device. Having vastly-expanded communication possibilities simply makes everything easier and more reliable.<\/span><\/p>\n<h2><b>The associated security <\/b><b><i>risks <\/i><\/b><b>of IoT devices<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">At the moment, one of the biggest issues with the prospect of the IoT becoming mainstream is that every introduction of an IoT-enabled device creates a fresh point of vulnerability. If you have 100 electronic devices set to network seamlessly, it only takes one of them being susceptible to hacking for the entire network to be compromised.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Before the IoT can reach its potential for <\/span><i><span style=\"font-weight: 400;\">providing <\/span><\/i><span style=\"font-weight: 400;\">security, its internal systems must themselves be fully secured. This will require regular updating, rapid bug-fixing, and smart hardware design <\/span><a href=\"https:\/\/www.smart-industry.net\/tamper-proof-chips-to-counter-physical-threat-against-iot\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">to make it prohibitively difficult to locally tamper with a device<\/span><\/a><span style=\"font-weight: 400;\"> (and\/or next to impossible for an altered device to connect to a secure network).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Is this impossible? No, far from it. Huge strides are being made in addressing the basic security issues with first-generation IoT devices (<\/span><a href=\"https:\/\/www.wired.com\/story\/iot-security-next-step\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Wired has a great piece on this<\/span><\/a><span style=\"font-weight: 400;\">), and if progress continues to be made, then IoT can certainly become the bedrock of a new style of operational security \u2014 and we can expect this to happen within the next decade, likely with the addition of a formal IoT security standard.<\/span><\/p>\n<p><b>Through automatically connecting entities \u2014 products, companies, locations, and other things besides \u2014 the IoT can greatly improve operational security: saving time, expanding communication possibilities, and making strong authentication simple. It isn\u2019t quite ready yet (which is to say that <\/b><b><i>we\u2019re <\/i><\/b><b>not ready to use it fully), but it will be soon.<\/b><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As the nascent Internet of Things enters its adolescence, it stands to prove transformational across entire industries, but it\u2019s already possible to implement IoT technology to great effect if the circumstances justify the early adoption. One area that certainly justifies it is security: more than ever before (following various high-profile cases of data theft), there\u2019s [&hellip;]<\/p>\n","protected":false},"author":105,"featured_media":15680,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1496,997],"tags":[996,1254,1020,686,689,690,680,1255,1185,258,260,1256,1114,1257,684],"form":[1499],"acf":[],"_links":{"self":[{"href":"https:\/\/www.jigsawacademy.com\/wp-json\/wp\/v2\/posts\/125571"}],"collection":[{"href":"https:\/\/www.jigsawacademy.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.jigsawacademy.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.jigsawacademy.com\/wp-json\/wp\/v2\/users\/105"}],"replies":[{"embeddable":true,"href":"https:\/\/www.jigsawacademy.com\/wp-json\/wp\/v2\/comments?post=125571"}],"version-history":[{"count":0,"href":"https:\/\/www.jigsawacademy.com\/wp-json\/wp\/v2\/posts\/125571\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.jigsawacademy.com\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.jigsawacademy.com\/wp-json\/wp\/v2\/media?parent=125571"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.jigsawacademy.com\/wp-json\/wp\/v2\/categories?post=125571"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.jigsawacademy.com\/wp-json\/wp\/v2\/tags?post=125571"},{"taxonomy":"form","embeddable":true,"href":"https:\/\/www.jigsawacademy.com\/wp-json\/wp\/v2\/form?post=125571"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}