As the Internet of Things encroaches on the enterprise, companies need to revamp their data protection strategy because old methods aren’t going to cut it, not in a world where there will be 25 billion or more Internet-connected IoT devices.
“Data protection is more complicated because the vast majority of these devices and the networks they use to communicate are not under the control of your company’s IT department. This is so because IoT devices are usually associated with operational technologies (OT), such as machines, aircraft engines, inside cars, etc., and continuously generate information about different parameters of the environment and the device (temperature, pressure, torque, etc.). ” .
This implies another challenge: “The most important change brought about by the current wave of the Internet of Things is a greater awareness of the existence (often isolated) of operating technology systems. This new awareness often sparks the desire to integrate these systems with the company’s existing software, in order to achieve the greater transparency, more efficient work processes and innovative business approaches made possible by these new integration bridges,” says Clemens Vasters , Principal Architect for Azure IoT at Microsoft.
Also Read : Does Using A VPN Protect Against Malware?
When addressing IoT for businesses that don’t have a data protection strategy, Microsoft’s Vasters recommends creating one that defines the principles and rules for how to handle, protect, and safeguard data against loss, even in catastrophic circumstances.
The company does not need to own or have immediate control over all the places where the data is, but it must know who stores that data and if the operator’s policies are compatible, as well as make sure that there are clear rules of responsibility in case of breach.
Also read : Data Center
If I were sitting down with someone, I think that’s the first piece of advice I’d give them,” suggests Marc Blackmer, director of product marketing for Industry Solutions, Security Business Group, Cisco. Blackmer also recommends developing a resource catalog. He also advises understanding the data flow model both within and between applications, apart from all external integrations.
“Part of the complexity that we’re talking about is the fact that there are thousands of third parties talking to each other,” explains Blackmer. “That’s unruly and makes companies desperate.”
Mark Hammond, senior director of security practices at Cisco, recommends that companies take several steps, including conducting a risk assessment, understanding and cataloging data, minimizing sensitive data, and then following data sanitization best practices and Security control.
Also Read : How To Choose The Best Phone With A Good Camera?
Techgup org is a dedicated technology website that delivers the latest updates, reviews, and insights…
Nai Taiyari.com is an innovative online learning and exam preparation platform designed to help students,…
Structurespy com is a digital intelligence platform designed to simplify data and provide actionable insights…
Nasik Fatafat is a popular lottery-style game in Nashik, Maharashtra, known for its fast-paced results…
52013l4 Meaning refers to a popular numeric code often used in digital communication to express…
Nuzillspex Advisors Ltd is a professional consulting and advisory firm specializing in financial services, business…