cl-au logo
Story image

IoT security: prioritise, practice, and predict

11 Apr 2018

With an influx of new smart home devices having entered Australian shores in the first few months of 2018, many Australians are welcoming these new convenient helpers into their homes.

Not too far removed from our personal lives, Australian businesses are dipping their toes into the Internet of Things (IoT) to gain benefits such as efficiencies and operational insights, from production flow monitoring to inventory management.

On the security side, IoT poses a tangible risk, however. As we continue to entrench our personal and professional lives with more ‘connected things,’ we drive both new levels of innovation, and at the same time, open ourselves up to a security minefield.

Regrettably, Australian organisations are already struggling even without this added layer of risk. In a recent report, we found that Australian companies face some of the highest numbers of IT incidents per month globally, and feel they are just about managing or struggling to deal with the volume of events.

It is therefore not particularly surprising that security in operational technology (OT) still remains the laggard. These systems used to control valves, conveyors and other machines to regulate variables such as temperature or pressure are critical to many modern organisations. However, the convergence of IT and OT opens up new attack surfaces.

Hackers have quickly learned the value in targeting OT which can bring business operations to its knees with shutdowns, equipment damage, supply-chain disruption, revenue losses and safety risks.

Finding a way to collect, store and analyse IT and OT data in silos is reasonably simple. Practising an analytics-driven approach to security by gathering relevant data from disparate sources to convert it into actionable insights, however, is a whole different ballgame.

To tackle some of these issues arising from the influx of new data sources, we recently developed our own solution that helps organisations in industries such as manufacturing, energy and utilities monitor and analyse industrial IoT data in real time.

Data gathered from IoT devices can empower businesses to take action across the whole ecosystem in real-time. This device-generated data provides a whole new lens to not only the industrial engineers but also security analysts; a real-world view for a proactive stance to investigating and responding to a breach or infection.

With data, one thing is certain: maintaining a consolidated view of what’s taking place in your network at any given moment is now a necessity. Each ‘connected thing’ opens new doors into personal intelligence, corporate intelligence and even public safety. Through these doors, we open ourselves up – as individuals and organisations – to new weaknesses hackers could exploit.

It is imperative for Australian businesses and decision makers to take this risk seriously.

Article by ‎Splunk Australia and New Zealand area vice president Simon Eid

Story image
Nutanix hires two new channel leads for ASEAN region
It comes as Nutanix experiences particularly strong growth in the region, including 125% year-on-year growth for Nutanix in Singapore, and 44% year-on-year growth in Indonesia in financial year 2020. More
Story image
New Linius solution enables search and assembly of video meeting clips
The new product, “WHIZZARD”, will soon be available to Zoom, Webex and Microsoft Teams users.More
Story image
Ivanti and Avast Business extend partnership, launch joint solution for SMBs
"By integrating an industry-leading Ivanti patch management technology into the Avast Business security platforms, we have been working to help ensure SMBs can simplify their critical patch management process to prevent risk and exposure."More
Story image
Apple launches App Store Small Business Programme
Developers can qualify for the programme and a reduced 15% commission if they earned up to US$1 million in proceeds during the previous calendar year.More
Story image
The cybersecurity risks that come with re-onshoring Australian manufacturing
As technology such as IoT, robotic process automation (RPA) and artificial intelligence (AI) reshapes the manufacturing landscape, organisations are simultaneously put at an increased risk of a cyberattack.More
Story image
Forrester names Thycotic a Leader in privileged access management
Thycotic received the highest possible score in 11 of the 24 criteria in the study, including SaaS/cloud, innovation roadmap, and integrations, deployment, supporting products and services, commercial model, and PIM installed base.More