Skip to content

Connectivity and the Threat to Data Security

Connectivity and the Threat to Data Security

In the modern world, technology is pervasive. It impacts all areas of life from basic human interaction to how we shape and work with the world around us. From its inception in the 1980s, the internet has been a growing part of technology, encouraging increasing connectivity and the growth of the IoT (Internet of Things).

The invention of the computer replaced many older-fashioned technologies (or was incorporated into them). For example, various versions of the cash register have been around for centuries. Modern versions include computers that talk to each other and the company’s network – some even helping to track inventory. Before modern technology, if you wanted to contact someone across the country or on a different continent, you would have to send a letter via stagecoach or ship (later this was sped up through the use of the railway system). This process could take many months, and there was no guarantee that the letter would ever reach the intended recipient. Today, all you have to do is pick up a phone and you can be connected in seconds.

Before I get into the content of my article, I would like to emphasize that there are a lot of wonderful opportunities created by modern technology and the ever-increasing growth of connected devices. The potential to track your home’s security, your personal health, and the well-being of your business from devices you use every day is incredible. New and creative answers to daily challenges are being invented daily with the potential to bring about a happier, healthier, and more efficient world.

The Internet of Things

The IoT is, “the concept of basically connecting any device with an on and off switch to the Internet (and/or to each other).” (Morgan) The impact of this is huge – ranging from personal use to practical business applications. Wouldn’t it be convenient to control your home’s security, lighting, energy usage, and feed your dog all from your phone? Well, this has become a reality. In the working world, this can include operating a manufacturing plant remotely or the ability for offices to integrate their devices (work computers, tablets, phones, etc.) to provide a seamless transition. Other potentials include “smart cities” where the technology is used to manage energy, reduce waste, and even control parking, (Morgan). 

Here are some examples of IoT devices:

Smart Medical Devices

  • Asthma control devices
  • Vital signs monitoring devices
  • Back therapy devices
  • Smart braces
  • Smart insulin pumps
  • Smart X-Rays
  • Smart MRIs
  • Smart vital baby sign monitors
  • Smart infant bottles
  • Smart pacifiers

Smart Home Devices

  • Smart lighting
  • Smart locks (doors/windows)
  • Security systems (cameras, alarms, heat/movement sensors…)
  • Smart thermostats/smart AC control
  • Smart cooking devices
  • Smart vacuums/smart mops
  • Smart scales
  • Smart water sprinklers
  • Smart lawn mowers

Smart Car Features

  • Telematics
  • GPS functionality
  • Keyless starters Apps to lock/unlock car
  • Car summoning capability

The Internet of People

We share massive amounts of personal data online — from addresses and jobs to photos, banking, and health records. This wealth of information makes us increasingly vulnerable.

The Internet of Services

Companies provide services online, collect and trade data, and offer everything from banking to streaming. All without face-to-face contact, exposing consumers to risks.

The Importance of Data Security

Daily, sensitive data is gathered — medical, financial, personal. Hackers exploit these, causing massive breaches. Attacks like WannaCry, Petya, and the Dyn DDOS show how IoT devices can be hijacked, disrupting hospitals, utilities, and even vehicles.

The Challenge Ahead

IoT boosts efficiency but creates critical vulnerabilities. Devices like X-ray machines, insulin pumps, and cars can be hacked. Yet, companies often neglect long-term security, leaving gaps unpatched. With most businesses adopting IoT but few confident in its safety, robust cybersecurity is no longer optional — it’s essential.

What can TUV USA, Inc. do (as a Certification Body) to help companies protect this data?

The value of quality system certification is not only in the piece of paper developed at the end of the audit process. The certificate assures clients and suppliers that the products and services offered are being designed, manufactured, and distributed by a company that takes quality seriously while also helping companies find areas for growth and improvement to improve their products and services.

Perhaps the best known and most widely used certificate is the ISO 9001 certificate. However, TUV USA believes that there is a standard that is growing quickly to fill the shoes of ISO 9001. ISO 27001 is a comprehensive standard based off of ISO 9001 and the former BS7799-2 standard, considering over-all quality and Information Security Management Systems (ISMS). Technology has grown to be a part of all aspects of life in the modern world. This push for connectivity will force companies to start monitoring and controlling their ISMS to ensure that they are taking proper consideration when incorporating connective technology into their own processes and the products and services they offer.

In addition to ISO 27001 certification, TUV USA’s parent company, TÜV NORD, has developed a separate certification, the Security4Safety (S4S), which is based off ISO 27001 and IEC 62443. This standard considers safety measures and the security of databases, software, and connected devices. This certification helps companies pin-point areas in their IT Security (confidentiality of data, integrity and accuracy of the data, and the availability of data) and Functional Safety (reliability of safety systems) that need improvement to prepare them for the new world driven by technology, while also helping provide solutions to these areas.

Conclusion

There are many concerns regarding the progression of connectivity in technology. Companies that act now to secure their systems and their products become a part of the solution in addressing and resolving these concerns. Embracing the new technologies with open arms while also incorporating caution in how they are used and what happens with the data they collect is a recipe for success in the evolving future of business and technologies.

References

Ahlers, M. M. (2013, May 30). TSA removes body scanners criticized as too revealing. Retrieved from CNN: edition.cnn.com/2013/05/29/travel/tsa-backscatter/index.html

BBC. (2017, January 11). Ukraine power cut 'was cyber-attack'. Retrieved from BBC News Technology: www.bbc.com/news/technology-38573074

Cara McGoogan, J. T. (2017, May 18). What is WannaCry and how does ransomware work? Retrieved from The Telegraph: www.telegraph.co.uk/technology/0/ransomware-does-work/

DYN. (2010, August 25). DNS: Why It's Important & How It Works. Retrieved from Dyn: dyn.com/blog/dns-why-its-important-how-it-works/

Farrell, S. (2015, November 6). Nearly 157,000 had data breached in TalkTalk cyber-attack. Retrieved from The Guardian: www.theguardian.com/business/2015/nov/06/nearly-157000-had-data-breached-in-talktalk-cyber-attack

Henley, J. (2017, June 27). 'Petya' ransomware attack strikes companies across Europe and US. Retrieved from The Guardian: www.theguardian.com/world/2017/jun/27/petya-ransomware-attack-strikes-companies-across-europe

Leetaru, K. (2016, October 31). The Dyn DDOS Attack and the Changing Balance of Online Cyber Power. Retrieved from Forbes: www.forbes.com/sites/kalevleetaru/2016/10/31/the-dyn-ddos-attack-and-the-changing-balance-of-online-cyber-power/

Meola, A. (2016, December 19). How the Internet of Things will affect security & privacy. Retrieved from Business Insider: www.businessinsider.de/internet-of-things-security-privacy-2016-8

Morgan, J. (2014, May 13). A Simple Explantation of 'The Internet Of Things". Retrieved from Forbes Leadership: www.forbes.com/sites/jacobmorgan/2014/05/13/simple-explanation-internet-things-that-anyone-can-understand/

Nagaraj, V. (2014, Feb. 26). The industrial IOT isn't the same as the consumer IOT. Retrieved from Forbes: www.forbes.com/sites/oreillymedia/2014/02/26/the-industrial-iot-isnt-the-same-as-the-consumer-iot/

Roberts, F. (2016, October 31). 9 examples of manufacturers making IIoT work for them. Retrieved from Internet of Business: internetofbusiness.com/9-examples-manufacturers-iiot/

Szoldra, P. (2016, June 28). The truth about car hacking is scarier than we realized. Retrieved from Business Insider: www.businessinsider.com/hacker-car-hacking-2016-6 Z

etter, K. (2016, January 1). Hacker Lexicon: What are DOS and DDOS attacks? Retrieved from WIRED: www.wired.com/2016/01/hacker-lexicon-what-are-dos-and-ddos-attacks/