Article

IoT Proliferation Teeters on the Edge

Alex Iuorio Headshot
cyber security chip on circuit board

In his January 12, 2015 speech to the Federal Trade Commission on the growing cyber security threat, U.S. President Barack Obama declared: “If we’re going to be connected, we’ve got to be protected.” At the same time the President was speaking, hackers seized control of the U.S. Central Command Twitter account. The irony of this situation would be comical if the national security implications of the breach weren’t so dire. But they were. And the clear takeaway from this scenario, and the many other high-profile hacks which have occurred since then, is that as connected as our society has become, we are still far from protected.

In fact, a report from digital security company Gemalto revealed that in 2014, more than a billion data records were compromised as a result of 1500+ data breaches worldwide—a 78 percent increase in the number of breached records in 2013. The Gemalto report notes that the size and frequency of these breaches continues to grow, despite enterprises spending $32 billion on security technology in 2013.

What these statistics reveal to me is that the current methods of enterprise security are simply no match for the cunning and malicious intent of today’s cyber hackers. One shortcoming in many enterprise IT strategies, I believe, is the failure to recognize that cloud technologies and the Internet of Things make it very difficult for organizations to define, and therefore defend, the “edge” of their enterprise through traditional network perimeter security technologies.

raw data code with "data breach" and "cyber attach" warnings in orange

Cloud technologies and the Internet of Things make it very difficult for organizations to define, and therefore defend, the “edge” of their enterprise

Companies will have firewalls to protect their server and storage networks, but they may not consider other potential points of entry, such as their connected lighting or HVAC systems. In addition, corporate bring-your-own-device (BYOD) adoption has opened a significant back door to many enterprise networks. According to a study released in 2014 by Hewlett-Packard, 70 percent of devices connected to the Internet are vulnerable to some form of hacking. This security picture is likely to get exponentially messier with predictions of as many as 26 billion connected appliances and devices in the next five years.

Clearly, making the IoT more secure will require a multi-layered approach that can enable networks to be open to connectivity, while creating absolute data protection. While I am far from an information security specialist, my experience with state-of-the-art electronic component technologies leads me to believe that device-level authentication technology such as NFC and use of digital certificates (PKI) holds a tremendous amount of potential for mitigating data security risks, including the pervasive man-in-the-middle (MITM) attack method.

Protecting enterprise IP in this evolving IoT era is undoubtedly the greatest IT challenge facing members of the electronics supply chain. There are no easy answers or silver bullets; but recognizing that traditional perimeter security strategies are insufficient to secure a network edge in the nebulous, virtually boundless Cloud is a crucial first step.

Related Resources:

About Author

Alex Iuorio Headshot
Alex Iuorio, Senior Vice President, Global Supplier Development

Alex Iuorio is a 40 year veteran of the high technology distribution industry. He has held various p...

  • Marketing Content Spots
    Related Articles
    Related Articles
    Avnet designs smart hard hat reference design
    /IOTCONNECT, powered by AWS, enables smart PPE, keeping site workers safer
    By Philip Ling   -   March 7, 2025
    Part of the value proposition for IoT technology and ubiquitous connectivity is enabling new approaches to solving long-standing challenges. Many of those challenges are incidental to the task, like keeping construction site workers safe.
    two people holding hands
    Monitoring vital signs through contactless technology
    By Philip Ling   -   February 27, 2025
    PrīmSphera, a revolutionary sensor technology company, is utilizing the Avnet suite at its core to drive innovation in healthcare fluid management.
    Related Events
    Related Events