The Cybersecurity Industry Meets Connectivity Challenges
Photo by David Becker/Getty
The connected device boom we’re experiencing right now makes it seem as though daily life will soon be an episode of The Jetsons. Technology is advancing at an astonishingly rapid pace, and tech companies are creating devices that make life easier than we ever could have imagined. On the surface, the connectivity boom is amazing and is making it so much easier to interact with the world around us throughout our daily lives.
However, with the increasing amount of connected devices that rely on cloud computing and the Internet of Things (IoT) to operate, leaders in the cybersecurity field are looking to identify the weak spots in connected systems and remedy them before a wide range of users’ devices are compromised. This not only is changing the industry dynamic right now, as cybersecurity leaders partner up with government legislators and businesses to guard against cyberattacks, but it is also signifying a notable shift towards a new cybersecurity vertical which focuses on the protection of connected devices.
Connected Devices Are Fraught With Security Weak Points
The Internet of Things is being used in a much greater capacity these days. Gartner, a technology research company, predicts that there will be 20.8 billion “things” in use either by enterprises or individual consumers by 2020—a shocking escalation from the 6.4 billion estimated for 2016. As a direct result of the massive growth in connected device usage, the cybersecurity industry has had to respond accordingly. But what exactly is at risk when a connected device is in use?
To answer that question and start working towards a solution, the OWASAP Internet of Things Project was created. This project is designed to, “help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies.”
The project has identified vulnerabilities that impact IoT devices ranging from insecure web interfaces to poor physical security. With the technology for connected devices evolving so quickly, and the demand for them ever-increasing, security interfaces haven’t been fully developed to optimally protect users.