An in depth look at security strategies for IoT in the enterprise.
IoT offers tremendous automation, intelligence, scale and efficiencies across the enterprise. Many of these technologies leverage cloud, data analytics, robotics and even machine-learning technologies. At the same time, the security issues arising in an IoT environment numbering an estimated 20 billion connected devices by 2020 cannot be overestimated and we believe that nowhere will this be more critical than among businesses. Cyber security strategies will need to adapt to accommodate the deluge of connected devices and the entirely new security risks each could create.
“There’s plenty of justifiable excitement but with the rapid proliferation of diverse IoT devices and applications from every corner imaginable, we are looking at unprecedented levels of risk until the required security solutions are truly understood and implemented by businesses jumping on the bandwagon. It’s happening very quickly and the time for enterprises to act on IoT security is now.” says Tim Zanni, Global Chair for TMT.
Many IoT devices that are finding their way into businesses were never designed to be in the enterprise and are therefore not being held to the same standards or vetted the same way as traditional IT equipment. Any internet-enabled device operating in the typical business environment today – from office speaker phones, boardroom TVs and AV equipment to printers, scanners, Wi-Fi enabled security cameras, appliances and much more – can be hacked unknowingly to provide attackers with confidential information. Treat that smart TV in your boardroom or your smart office printer as though they are computers on your network, because that’s how they function.
Enterprise IoT risks and solutions are no longer ‘IT issues’ for the enterprise tech team to solve, they are “business issues”. As we evolve into a ‘networked society,’ enterprises need to waste no time in facing the advance of IoT as a key business issue demanding new levels of education and response from senior leaders and boards acting as engaged and bona fide ‘change champions.’
Based on insights from industry leaders, analysts, third party research, and KPMG 's own IoT and cyber security professionals, this report examines the three dimensions – devices, ecosystem and use cases - that are imperative to understanding and addressing IoT security challenges in the enterprise