Select your language

5 Tips for a More Secure IoT

Latin America. Current technology for the Internet of Things (IoT) has some limitations: battery life, bandwidth, transmission range, interoperability, among others. But don't be fooled, the available technology is enough to generate big changes in production processes, products, services and customer experiences.

A frequent topic in discussions about the Internet of Things is cybersecurity. It is not a minor problem, but perhaps it deserves an adjustment in its approach: cybersecurity should not be an obstacle to the IoT, but an enabler, you can promote it with the use of numerous tools, best practices and experiences drawn from the IT world.

Here's a 5-step guide to achieving these goals, ensuring that innovation in business and cybersecurity is aligned:

1) Security Awareness as a Principle: Whenever we incorporate new technologies into our lives and in business, we have the opportunity to start from scratch and design and implement architectures that incorporate the issue of security not only as a requirement, but as a principle for all decisions. Not only will it make security more effective and economical, it also supports riskier technical and business decisions, increasing the chances. This awareness should permeate the entire organization.

- Publicidad -

2) Identification of Security Requirements: Adoption involves considerations in the design of the technical architecture and its management model. At the stage when business requirements are identified, security requirements should also be included. As for the technical architecture, it is necessary to include incident prevention and containment mechanisms so that from the beginning it is reliable. For that, it is necessary to evaluate the capabilities and functionalities of the different elements: their sensors, their gateways, their vulnerabilities; what is the nature of the data they will transit, with which applications they will interact and where they are located – corporate data centers, mobile devices, cloud systems; and for whom they are intended, whether employees, third parties, customers or partners. Risk profiles must be identified as well as actions (mitigate, transfer, avoid, accept).

3) Containment mechanisms: Containment is commonly associated with incident response and isolating its effects. But doesn't it seem more effective to take it to the solution, design and deployment phase? Micro-segmentation technology can previously prevent the effect of unforeseen futures with different risk profiles. If you design and deploy the IoT architecture with containment as a principle, you will be one step ahead of cyber criminals in the event of successful access to your infrastructure. It is about reducing the Attack Surface, taking advantage of the flexibility and scalability that only advanced techniques provide. In addition, if network micro-segmentation is done by software, dynamic perimeter readjustment techniques can increase the resiliency and security of the architecture.

4) Operation: Incident Detection deserves attention. The volume and heterogeneity of connected devices as well as data should produce millions of alerts per day. Ensuring that relevant alerts are noticed, and only these, is like finding a needle in a haystack. Therefore, event correlation tools and SIEM (Security Incident & Event Management) platforms will be crucial to address this challenge.

5) Incident Response: Detection is necessary. This phase should provide qualified processes, tools, and professionals to effectively identify causes, investigate circumstances, and act on correction. 

As the line between the physical and digital worlds becomes dimmer, businesses become more susceptible to rapid change. It is important to review business strategies, weighing the opportunities and risks that the Internet of Things brings us. Among the risks, those caused by cybercrime can be analyzed under existing security practices, they are detected from the progress observed in recent years. The important thing is not to be scared. Fear of risks cannot paralyze the business. The biggest risk is not adapting.

Text written by Leonardo Carissimi, director of security solutions at Unisys for Latin America.

Richard Santa, RAVT
Richard Santa, RAVTEmail: [email protected]
Editor
Periodista de la Universidad de Antioquia (2010), con experiencia en temas sobre tecnología y economía. Editor de las revistas TVyVideo+Radio y AVI Latinoamérica. Coordinador académico de TecnoTelevisión&Radio.


No comments

• If you're already registered, please log in first. Your email will not be published.

Leave your comment

In reply to Some User
CALA Awards opens applications for AV and lighting projects

CALA Awards opens applications for AV and lighting projects

Latin America. Within the framework of IntegraTec Mexico, AVI Latin America announces that the call for the CALA AWARDS 2025, awards that celebrate excellence in technological integration in Latin...

Star Line Music supports your events in Peru with DAS Audio

Star Line Music supports your events in Peru with DAS Audio

Peru. Star Line Music, with a history of more than 27 years in the Peruvian market, became the official distributor of DAS Audio in the Andean nation after the pandemic. The sound systems they...

Yamaki opens showroom for the events industry

Yamaki opens showroom for the events industry

Colombia. Yamaki presented its new showroom in Bogotá, a space designed for event producers, rental companies, auditoriums, churches and professional artists to experience live the most advanced...

Dolby and Christie to unveil laser projection system

Dolby and Christie to unveil laser projection system

Latin America. Christie and Dolby Laboratories renewed their collaboration to develop the next generation of Dolby Vision laser projection systems, which will begin to be implemented in cinemas from...

Cleerline introduced microdistribution fiber optic cable

Cleerline introduced microdistribution fiber optic cable

Latin America. Cleerline Technology Group has introduced the SSF Double Sheathed Micro Distribution Fiber Optic Cable (DJMD). This new cable has been designed to bridge the critical gap between...

Experience for the palate and ears

Experience for the palate and ears

With a Bose Professional sound system, integrated by We Tech, Rock & Feller's Unicenter restaurant in Buenos Aires offers a gastronomic experience set to energetic music Bose Professional

How to generate value with intelligent data centers?

How to generate value with intelligent data centers?

Colombia. In the last decade, data centers have become one of the most important tools for companies looking to scale in the market and generate increasingly personalized services.

Dahua Introduced Comprehensive Educational Products

Dahua Introduced Comprehensive Educational Products

Latin America. Dahua Technology introduced a series of smart education solutions and products designed to strengthen the education sector through innovative technologies, driving the global digital...

The key competencies to lead in the digital age

The key competencies to lead in the digital age

Colombia. The digital revolution has transformed the rules of the game in the business world. Today, leading does not only imply experience or authority, but the ability to innovate, adapt and take...

Extron Launched 5K Multi-Window Processors with Annotation

Extron Launched 5K Multi-Window Processors with Annotation

Latin America. Extron announced the new MGP 641 xi 5K multi-window processors to scale and present up to four 5K sources on a single screen, including 5K and ultrawide display devices.

Suscribase Gratis
Remember Me
SUBSCRIBE TO OUR ENGLISH NEWSLETTER
DO YOU NEED A SERVICE OR PRODUCT QUOTE?
LATEST INTERVIEWS
SITE SPONSORS










LATEST NEWSLETTER
Ultimo Info-Boletin