https://www.iotworldtoday.com/wp-content/themes/ioti_child/assets/images/logo/footer-logo.png
  • Home
  • News
    • Back
    • IoT World 2020 News
  • Strategy
  • Special Reports
  • Galleries
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • IoT World 2020 News
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Video / Podcasts
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Strategic Partners
  • IOT World Events
    • Back
    • Internet of Things World: San Jose
    • IoT World 2020 News
Iot World Today
  • NEWSLETTER
  • Home
  • News
    • Back
    • IoT World 2020 News
  • Strategy
  • Special Reports
  • Galleries
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • IoT World 2020 News
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Video / Podcasts
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Strategic Partners
  • IOT World Events
    • Back
    • Internet of Things World: San Jose
    • IoT World 2020 News
  • newsletter
  • IIoT
  • Cities
  • Energy
  • Homes/Buildings
  • Transportation/Logistics
  • Connected Health Care
  • Retail
  • AI
  • Architecture
  • Engineering/Development
  • Security
ioti.com

Security


Keeping Cybersecurity Spending on Track as IoT Adoption Swells

It can be difficult to keep cybersecurity spending on track. While underinvesting is common, so is waste.
  • Written by Brian Buntz
  • 12th July 2018

Although difficult to track, cybersecurity spending is likely at an all-time high, and continues to snowball. This year, global spending for security software, hardware and services could hit $91.4 billion, a 10.2 percent jump over last year. IoT security-targeted expenditures remain a sliver of that sum, with Gartner estimating that IoT spending will hit $1.5 billion in 2018. The firm predicts that total will double by 2021.

That doesn’t mean all of that cybersecurity spending is useful. Large enterprises spend up to $300,000 each year on cybersecurity-focused education that frequently warns users to avoid falling for phishing schemes. According to Verizon’s 2018 Data Breach Investigations Report, phishing and pretexting account for 93 percent of breaches. Cisco has reached similar conclusions about the problem. “Our research has shown that despite user training, people still habitually click links,” said Jon Stanford, director, OT platforms and IoT cybersecurity at Cisco Advanced Services.

Meanwhile, easy-to-prevent cybersecurity vulnerabilities are common. Default passwords on IoT devices, for instance, have enabled the Mirai botnet — and its variants — to enslave hundreds of thousands of devices. Default passwords in IoT devices continue to be common, with many of them just a Google search away.

At the enterprise and industrial levels, security spending on security technology often buys gadgets and appliances that do little to protect against cybercriminals. “I cannot tell you how many companies I’ve been to where I walk into their data center, and there are racks and racks of security appliances that are turned off,” said Andrew Howard, global chief technology officer at Kudelski Security. “They’re buying more appliances and solutions than they can possibly use.”

The fact is, it is challenging to come up with a strategic plan for how to achieve the “biggest risk reduction bang for the buck,” said Andy Bochman, senior grid strategist at Idaho National Laboratory in a May interview with IoT Institute. It is difficult for a chief security officer to vet security and equally difficult for a chief financial officer whose job it is to understand what the CSO is asking for represents the best use of money. “How the heck are they going to measure whether it is worthwhile?” Bochman asks.

One of the most common considerations when allocating security spending is to look at the prior year’s investment and to decide whether to increase it. “You could also look to your peer companies and see what they are spending and implementing,” Bochman said. Neither strategy, however, is directly connected to what is happening in the threat landscape.

Some companies, seeing the challenges of allocating security spending, essentially decide more is better when it comes to investing in cyber services and products. “I’m aware of multiple big companies where the cybersecurity leader has an unlimited budget,” Howard said.

Frequently, that spending goes to several bleeding-edge sounding technologies that, first, lacks a proven track record, and, second, may be difficult to integrate with other cybersecurity technologies.

Many companies run into the problem of attempting to try to deploy advanced cybersecurity technologies while they lag in managing patching, access control and studying the threat landscape. “My advice to most companies is: ‘Don’t go buy more things until you first focus on the basics,’” Howard said. That can be hard, given that many companies are working simultaneously to minimize risk while increasing the velocity at which they launch new products and services. “That is the biggest concern of many cybersecurity [professionals]. The business is putting so much pressure on them to get a new product or capability to market that the security group just can’t keep up,” Howard added. “A lot of the manufacturers are trying to differentiate their product based on cost, but even adding in bare-minimum security is gonna to add cost.”

The concept of cybersecurity basics includes more than vendor-solutions and cyber hygiene. It involves identifying businesses processes that can’t be allowed to fail for any reason and ultimately devising low-tech or analog-based methods for protecting them.

“Having fail-safes in place is important,” Howard said. An example could be storing data on a local hard drive. “In today’s environment, that just seems crazy because of the prevalence of cloud, but there’s some real value to having your data backed up offline.” Another example would be for industrial companies to put analog or hardware-based safety controls in place. “If you have something you don’t want to go above 100 degrees Celsius, you probably shouldn’t just check that in software,” Howard added.

In general, organizations should think about what their ultimate fail-safe might be, “whether that’s an offline backup, an analog solution or a human reviewing something,” Howard added. “While these strategies might slow things down potentially, they also add a layer of safety that is hard to replicate.”

Tags: Article Security Technologies

Related


  • 3d rendering of human brain on technology background
    AI Ups the Ante for IoT Cybersecurity
    Security providers in IT and OT have implemented AI, ML and other advanced technologies to make systems smarter than malicious attackers.
  • IoT security
    Protecting Your Network Against Ripple20 Vulnerabilities
    Early this year, Ripple20 wrought havoc on numerous IoT devices, given vulnerable third-party code. Here are ways to prevent your organization from the fallout.
  • IoT security
    IoT Security Trends, 2021: COVID-19 Casts Long Shadow
    While some IoT security trends in 2021 will continue trends from 2019 and 2020, COVID-19 has brought some new threats to the fore.
  • IoT security
    IoT Device Security: Risk Assessment, Hygiene Are Key
    As devices and data proliferate at the edge of the network, IT pros have encountered new challenges in securing enterprise IT systems.

Leave a comment Cancel reply

-or-

Log in with your IoT World Today account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Related Content

  • COVID-19 Driving Data Integration Projects in IoT
  • Intro to LynxSecure
  • Can Privacy-Preserving Machine Learning Overcome Data-Sharing Worries?
  • Cybersecurity Crisis Management During the Coronavirus Pandemic

News

View all

Private LTE Market Projected to Grow to $13 Billion

12th January 2021

IoT World Announces 2021 IoT World Advisory Board

9th December 2020

White Papers

View all

The eSIM Cookbook – Towards the Next Generation of Connected Devices

22nd February 2021

eSIM Delivers Greater Freedom for OEMs – by Beecham Research and Truphone

22nd February 2021

Special Reports

View all

Cybersecurity Protection Increasingly Depends on Machine Learning

28th October 2020

Webinars

View all

Weber’s Journey: How a Top Grill Maker Serves Up Connected Cooking

25th February 2021

From Insights to Action: Best Practices for Implementing Connected Device Security

15th December 2020

Galleries

View all

Top IoT Trends to Watch in 2020

26th January 2020

Five of the Most Promising Digital Health Technologies

14th January 2020

Industry Perspectives

View all

IoT Spending Holds Firm — Tempered by Dose of ‘IoT Pragmatism’

1st December 2020

The Great IoT Connectivity Lockdown

11th May 2020

Events

View all

IoT at the Edge

17th March 2021

Embedded IoT World 2021

28th April 2021 - 29th April 2021

IoT World 2021

2nd November 2021 - 4th November 2021

Twitter

IoTWorldToday, IoTWorldSeries

📢 Announcing #EIOTWORLD sponsor, @aicas_IoT — a flexible, more efficient approach to embedded realtime application… twitter.com/i/web/status/1…

4th March 2021
IoTWorldToday, IoTWorldSeries

Microsoft Ignite 2021: Innovation in COVID-19 Era Signals Future Trends dlvr.it/RtwYcg

4th March 2021
IoTWorldToday, IoTWorldSeries

At Microsoft Ignite: How IoT and Robotics Are Driving Industry 4.0 dlvr.it/Rttgwj

3rd March 2021
IoTWorldToday, IoTWorldSeries

🎙️ Introducing #EIOTWORLD speaker, Obinna Ilochonwu, Industrial IoT Architect at Schlumberger. 📅 Join his session… twitter.com/i/web/status/1…

2nd March 2021
IoTWorldToday, IoTWorldSeries

#Smartbuilding technology lays the foundation for #energyefficiency efforts but also new COVID-19 goals, such as… twitter.com/i/web/status/1…

2nd March 2021
IoTWorldToday, IoTWorldSeries

IoT Remote Monitoring Helps Enterprises Traverse COVID-19 and Beyond dlvr.it/RtZ3K5 https://t.co/owJXYf1gkO

26th February 2021
IoTWorldToday, IoTWorldSeries

Securing the Industrial Internet of Things dlvr.it/RtYfYk https://t.co/khUn79dvQD

26th February 2021
IoTWorldToday, IoTWorldSeries

📢 Announcing #EIOTWORLD sponsor, @BluetoothSIG — the global standard for simple, secure wireless connections. ➕ Le… twitter.com/i/web/status/1…

26th February 2021

Newsletter

Sign up for IoT World Today newsletters: vertical industry coverage on Tuesdays and horizontal tech coverage on Thursdays.

Special Reports

Our Special Reports take an in-depth look at key topics within the IoT space. Download our latest reports.

Business Resources

Find the latest white papers and other resources from selected vendors.

Media Kit and Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • IoT World Series
  • Channel Futures
  • RISC-V
  • Dark Reading
  • ITPro Today
  • Web Hosting Talk

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Login/Register

FOLLOW IoT World Today ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookies Policy
  • Terms
Copyright © 2021 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X