Skip to content
11:11 Systems
Rethink Connected
11:11 Systems11:11 Systems
  • Why 11:11
    • Submenu
      • Column 1
        • 11:11 Systems Consulting
          Consulting Services
          Global Regions
          Cloud Regions
          11:11 Systems Security
          Security

      • Column 2
        • Cloud Console
          Cloud Console
          Catalyst
          Planning and Assessment
          Compliance
          Compliance

      • WHY CHOOSE 11:11
      • Overview
      • Leadership
      • News & Media
      •  
      • Careers
      • Technology Partners
      • Customer Stories
  • Products & Services
    • Products & Services
      • CLOUD
      • Cloud Overview
      • Public Cloud
      • Private Cloud
      • Object Storage
      • Cloud Labs
      • Colocation/Bare-Metal
      • BACKUP
      • Backup Overview
      • Veeam Backup
      • Microsoft 365 Backup
      • Managed Backup for Cohesity
      • Data Protection Services
      • DISASTER RECOVERY
      • DRaaS Overview
      • DRaaS for Veeam
      • DRaaS for Zerto
      • DRaaS for Azure
      • Managed Recovery
      • Cloud Recovery
      • Cyber Incident Recovery
      • Business Continuity Consulting and Services
      • Physical Infrastructure Recovery Services
      • SECURITY
      • Security Overview
      • Continuous Risk Scanning
      • Managed Detection and Response
      • Managed SIEM
      • Managed EDR
      • Managed Firewall
      • CONNECTIVITY
      • Connectivity Overview
      • SD-WAN
      • Multi-Cloud Connect
      • Managed IP
  • Solutions
    • Solutions Submenu
      • INDUSTRY
      • Education
      • Financial
      • Government
      • Healthcare
  • Partners
    • Partners Submenu
      • Overview
      • Become a Partner
      • Partner Portals
  • Resources
    • Resources Submenu
      • Events
      • Webinars
      • News & Media
      • White Papers
      • Podcast
      • Data Sheets
      • Customer Stories
      • Innovation Blog
  • Support
    • Support Submenu
      • Contact Support
      • Product Documentation
      • API Documentation
Search:
  • Console Login
  • Contact
Header Right Menu
Free Trial
  • Why 11:11
    • Consulting Services
    • Cloud Console
    • Cloud Regions
    • Planning and Assessment
    • Security
    • Compliance
    • WHY CHOOSE 11:11
    • Overview
    • Leadership
    • News & Media
    • Careers
    • Technology Partners
    • Customer Stories
    • Blog
  • Products & Services
    • CLOUD
    • Cloud Overview
    • Public Cloud
    • Private Cloud
    • Object Storage
    • Cloud Labs
    • Colocation/Bare-Metal
    • BACKUP
    • Backup Overview
    • Veeam Backup
    • Microsoft 365 Backup
    • Managed Backup for Cohesity
    • Data Protection Services
    • DISASTER RECOVERY
    • DRaaS Overview
    • DRaaS for Veeam
    • DRaaS for Zerto
    • DRaaS for Azure
    • Managed Recovery
    • Cloud Recovery
    • Cyber Incident Recovery
    • Business Continuity Consulting and Services
    • Physical Infrastructure Recovery Services
    • SECURITY
    • Security Overview
    • Continuous Risk Scanning
    • Managed Detection and Response
    • Managed SIEM
    • Managed EDR
    • Managed Firewall
    • CLOUD CONNECTIVITY
    • Connectivity Overview
    • SD-WAN
    • Multi Cloud Connect
    • Managed IP
  • Solutions
    • INDUSTRY
    • Education
    • Financial
    • Government
    • Healthcare
    • Column 2
  • Partners
    • Overview
    • Become a Partner
    • Partner Portals
  • Resources
    • Events
    • Webinars
    • News & Media
    • Whitepapers
    • Podcast
    • Datasheets
    • Customer Stories
    • Innovation Blog
  • Support
    • Contact Support
    • Success Center
    • API Documentation
  • Contact
  • Console Login
  • Free Trial
Author: Frank Arriaga
Date: September 20, 2016

The Security of Things

Editor’s Note: As of January 2022, iland is now 11:11 Systems, a managed infrastructure solutions provider at the forefront of cloud, connectivity, and security. As a legacy iland.com blog post, this article likely contains information that is no longer relevant. For the most up-to-date product information and resources, or if you have further questions, please refer to the 11:11 Systems Success Center or contact us directly.

It’s easy to get sidetracked by all the bright lights and shiny new gadgets that the era of the IoT has brought with it. But it’s time to step out of the haze and take a minute to talk about security.

Millions of people across the globe are connecting with these devices and sharing valuable data. But the potential misuse of this data remains tucked under IoT’s novelty halo effect. In its infancy, the World Wide Web brought with it little protection for misuse, which, in turn, generated distrust by consumers and slowed down initial e-commerce efforts. But that was the year 2004. Skip ahead in time, and e-commerce now represents nearly 10% of all retail sales in the US.

Encryption is a standard, and people no longer fret about sending their credit card information over the wire. For the most part, the security issues are kept at bay. It almost seems as if we are in a cycle in which consumers trust companies with their valuable data blindly, and only in the case of known and reported intrusions do we then punish the OEM or online service by jumping ship.

But a zero-day exploit on a POS terminal is much easier to remedy than an attack on a company’s cloud services infrastructure. That’s why the security of that cloud has to be paramount to IT decision-makers – and to compliance auditors.

Take, for instance, GM’s IoT initiative for OnStar-enabled vehicles. Everyone loves the app and the nifty things you can do with it. The killer feature, however, is a security measure that allows police to remotely stop a vehicle. Now put this feature into the hands of a malicious hacker, and suddenly he can disable thousands of vehicles, request emergency medical care, or even change everyone’s seat height. While I admit that I chose OnStar because the same argument can easily be made against Tesla’s self-driving features, vehicles are not the only potentially dangerous connected devices. Connected stoves, coffee makers, and smart fridges are here to stay.

Early adopters beware; the best advice is to follow the data. Know how the company behind your latest gadget’s brains handles security. And while it may be convenient to ask Alexa to turn on the lights or lock the doors, it would be a shame if someone whispered the opposite.

Category: SecurityBy Frank ArriagaSeptember 20, 2016

Author: Frank Arriaga

Frank has 2 years of experience working in online marketing. He is now currently pursuing sales in the technology industry at 11:11 Systems. Having spent half of his life in Mexico, he often wonders where he is actually from.

Post navigation

PreviousPrevious post:Options for Migrating to a VMware-based CloudNextNext post:Infographic – The State of IT Disaster Recovery in the UK

Related Posts

Veeam, AWS, and 11:11 Systems logos
Best in Class for Data Protection
September 20, 2023
cyber threats, cyber attacks, cyberthreats, cyberattacks, cyber incidents, ransomware
As MGM Struggles Amid Ransomware Fallout, Data Recovery Lessons Abound
September 18, 2023
layered security strategy
Why a Layered Security Strategy Matters
September 11, 2023
protect your brand reputation from cyber-attacks, stay under the radar
“Flying Under the Radar:” How to Protect Your Organization’s Reputation
August 31, 2023
Managed NGFW
“Don’t be a “Holdover”: Is it time for a Next Generation Firewall?
August 22, 2023
Cloud Challenges
Spending, Security, and Expertise Are the Top 3 Cloud Challenges — But They Don’t Have to Be Yours
August 21, 2023
PRODUCTS & SERVICES
  • Cloud
  • Backup
  • Disaster Recovery
  • Managed Security
  • Connectivity Solutions
  • Compliance
COMPANY
  • Why 11:11
  • Customer Stories
  • Careers
  • Leadership
  • Technology Partners
  • News & Media
  • Contact Support
CLOUD REGIONS
  • North America
  • EMEA
  • APAC
CONNECT
  • LinkedIn
  • Twitter
  • Youtube

© 2023 11:11 Systems Inc., All Rights Reserved | Privacy Notice |

Go to Top

https://1111systems.com/wp-content/uploads/2023/04/HPE-video-for-1111-SKO.mp4

https://1111systems.com/wp-content/uploads/2023/04/Dell-Global-Alliance-video-for-1111-SKO.mp4