Vanderbilt Industries

By now, you've probably heard the conversation about the importance of the Internet of Things (IoT) security over and over again; the increased interconnectivity and communication between devices brings with it a greater risk for cyber threats and attacks. One small leak or breach on a single device can potentially spread across the cloud and create a noteworthy disruption within a company, affecting its assets, employees and customers.

Responsibility for IoT security

But now that the risk factor has been identified and presumably understood, has it been made clear who is in fact responsible for carrying out IoT security? With many players involved in the operation and maintenance of security devices, uncertainty is understandable. According to a report from Radware, a provider of application delivery and cybersecurity solutions, there was no clear consensus among security executives when asked who is responsible for IoT security.

Each entity must take responsibility for contributing to comprehensive IoT security

Thirty-five percent of respondents placed responsibility on the organisation managing the network, 34 percent said the manufacturer and 21 percent chose the consumers using the devices as being primarily responsible. These responses represent the truth of the matter: each one of these entities must take responsibility for contributing to comprehensive IoT security.

Strengthening cybersecurity of IoT

It's not surprising that most respondents to the survey mentioned above chose the organisation as the main stakeholder for IoT security responsibility; after all, if a company is managing a network, one would expect it to protect the network as well. This can be attained by adapting a user-centric design with scalability, tactical data storage and access with appropriate identification and security features (for example, the use of multilevel authentication through biometrics in access control).

Organisations must also use their IT team to strengthen the overall cybersecurity of the IoT by keeping up with the latest software updates, following proper data-safety protocols and practicing vulnerability testing.

Ensuring encryption between devices is a key step to work toward achieving complete protection in the IoTManufacturers that provide IoT-enabled devices as part of a security system must be fully knowledgeable of the risks involved and effectively communicate them to the integrator or end user. Providing the education necessary and dedication to protecting users of its equipment makes a manufacturer more trustworthy and understanding in the eyes of an end user. Ensuring encryption between devices is a key step that manufacturers can take to work toward achieving complete protection in the IoT.

Best data security practices

Despite the protection delivered by the organisation and manufacturer, there's always the option for IoT security to be enhanced or possibly even diminished by the individual user. It's critical that best practices for data protection are in place every time an individual uses a device that is connected to the network. These include disabling default credentials, proper password etiquette, safe sharing of sensitive information and the instinct to avoid any suspicious activity or requests.

The best way to clear up the general misunderstanding about IoT security responsibility is to emphasize that every contributor to the development and use of an IoT-enabled device plays an important role that cannot be dismissed. Despite the growing fear of threats to the IoT, the organisation, manufacturer and user can work together and combine techniques to form a guarded and secure system.

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version

Vanderbilt Industries news

What technology buzz will dominate the security industry in 2020?

The new year comes with new opportunities for the security industry, but what technologies will dominate our discussions in 2020? Topics such as artificial intelligence (AI) and HCI (hyperconverged infrastructure) became familiar in conversations during 2019, and they are likely to dominate our thoughts again in the new year. But other buzzwords are also gaining steam, such as “blockchain” and “frictionless access control.” Connectivity and the cloud will also be timely t...

Vanderbilt announces adding ZKTeco biometric readers to its access control portfolio

Vanderbilt, globally renowned provider of state-of-the-art security systems, has announced the addition of three ZKTeco biometric readers into its access control portfolio. ZKTeco biometric readers The latest addition to the ever-growing access control portfolio comes off the back of the launch of the company’s Bluetooth Low Energy (BLE) readers, plus the inclusion of Akuvox’s IP Door Entry Phones into their collection of products. As with the BLE readers, the biometric readers int...

What are the benefits of selling security solutions?

Products are the building blocks of the security industry. Historically much of the industry’s sales effort has been focused on highlighting product features and functionality. At the end of the day, however, an end user is less interested in the performance of any individual system component than in the system as a whole. Lately, the industry has embraced a changing sales approach by emphasising systems rather than products. We asked this week’s Expert Panel Roundtable: What are the...

Vanderbilt Industries case studies

Vanderbilt’s SPC Wireless devices are the perfect match for retail establishments

Vanderbilt’s SPC Wireless is an ideal fit for the retail sector. First off, SPC Wireless devices’ aesthetically appealing design is perfect to fit in with retail environments and compliment the surrounding environments of a modern-day retail store. But, as well as featuring a sleek design, the Wireless devices also have many standout features that specifically benefit the retail sector. Automatic power saving One of these benefits is long battery life as the devices are supported b...

Vanderbilt ACT365 addresses access control security concerns at Study Abroad University, London

Access control has become a central component for the safety and security strategies of today's schools, and due to the complicated threats and challenges these facilities face, a school's access control technology must be innovative and intelligent enough to ensure comprehensive protection. The education sector is a gateway to the future for young people all over the world. But to assure this passage, schools must guarantee their students safety as well as their education. One such example of...

Vanderbilt’s ACT365 cloud-based access control solution protects Work.Life facility in London

Security installation specialist Vision Security Services installed Vanderbilt’s ACT365, a cloud-based access control and video management system, at Work.Life, a co-working and private offices facility in London Fields, east London. The ACT365 solution was implemented late in the construction stage, as initially, the client had used a conventional system, before realising late-on the benefits available from cloud management. Essentially, the client needed unified management of access poi...