We are currently witnessing exponential growth in IoT deployments around the world.
It’s estimated there will be 30 billion connected devices deployed across homes, businesses and national infrastructure by the end of this decade.
But, as connected products become increasingly woven into our everyday lives, and we become more dependent upon them, concerns about security are also on the rise.
The potential damage to end users, and to the reputations of manufacturers, can be severe – and it has prompted regulators to demand stricter security standards that tackle the specific vulnerabilities of IoT devices. This includes the threats posed by remote hacks and physical tampering.
To address this, manufacturers will need to adopt a more holistic approach to IoT security. This includes adopting a zero trust model to increase resilience, and leveraging the unique features of silicon chips and secure elements on microprocessors to bolster device security.
Our latest paper Securing the connected future: Strategies for IoT Device Resilience and Silicon Chip Security looks at how organisations can build resilience and protect themselves from risk. This is a must-read for anyone looking to prioritise IoT security and outlines the strategies companies can adopt to protect devices, with a special emphasis on prevention, detection and recovery.
Extracts from the paper_
‘‘Under new EU rules, companies manufacturing products that fall under the definition of Critical Class II – which includes operating systems, industrial firewalls and CPUs – will also face third-party security assessments. This legal imperative, along with the demands of customers to provide reliable products, is pushing the importance of IoT security up the priority list.’’
‘‘The major problem for manufacturers looking to secure IoT devices is that they present a different challenge to traditional IT equipment. In the past, IT professionals have adopted a citadel style approach, where they would protect the border walls of their corporate network with ‘guards and gates’. But with IoT devices operating outside those border walls, it’s not possible to adopt the same security practices we have seen deployed over the last 30 years.’’
Download the WhitepaperContributors_
Lena Rodziewicz
Technical Solution Architect for Connected Devices at Mobica
Lena Rodziewicz is a seasoned Technical Solution Architect with a keen focus on connected devices. During a career spanning almost two decades, Lena has established herself as a driving force in the design of innovative and pragmatic solutions within the technology industry.
Lena has an unwavering passion for new technologies, an acute awareness of the evolving commercial landscape and always considers the bigger picture when it comes to customer requirements. This enables her to craft solutions that both align with cutting-edge trends and provide practical, sustainable answers to complex challenges.
Mozammul Ahmed
Edge and Embedded Technology Solutions Manager
Moz has been working at the intersection of software and hardware for more than 20 years. Working in the Technology Consultancy, Semiconductor Design and Consumer Electronics industries, Moz has helped many of the world’s biggest technology companies manage their products’ security.
Now a member of Mobica’s Technology Office, Moz works in the company’s Semiconductor business practice and is responsible for bridging the gap between commercial and technical domains. He is happiest when he is designing the technical solutions that solve our customers’ problems – particularly when this involves applying new technologies in novel ways.
Quotes_
‘‘To protect customers, manufacturers need to assume their devices could be hacked and take a Zero Trust approach. This will require them to limit data held on their devices to minimise any exposure in the event of a successful attack. They will also need to enable detection and facilitate recovery. This will build resilience should the worst happen.’’
‘‘Manufacturers can take advantage of the unique characteristics of silicon chips to protect communications and create a distinct identity for every single device produced. One of the ways to do this is to utilise microscopic variations within a silicon chip. This can provide a unique seed for the production of the cryptographic keys that are required to verify whether communications with the device are authentic.’’