Blog

IoT cyber-attacks and data theft - Apocalyptic or solved with the right solutions?

Matt McPherson, UK Sales Manager of Wireless Logic, explains that solutions are out there

15th August 2015 | Matt McPherson, UK Sales Manager

Connected dumb and smart devices are falling victim to attacks in unsecure networks

With Hewlett-Packard (HP) reporting that up to 70% of devices developed for the Internet of Things (IoT) are vulnerable to cyber-attacks, the technology phenomenon that will impact on all of our lives, which will see some 26 billion installed units by 2020 according to Gartner, is under constant review in relation to data security. And this is further endorsed by Symantec’s recent commentary in relation to m-Health devices that were proven hackable by a simple $70 adapted hardware gadget. With the world rapidly heading towards a digitally beating pulse, the need to ‘lock down’ mission critical’ data across multiple applications has never been greater.

M2M/IoT platform managed services offer resilient and secure answers

Matt McPherson, UK Sales Manager of Wireless Logic, a European leader in M2M/IoT platform managed services explains that solutions are out there – it’s simply a case of knowing what to do and where to go: “At Wireless Logic, we have a growing base in excess of 1.5 million connected devices, the vast majority of which are across cellular networks. More and more of these applications are choosing to ‘overlay’ virtual private networks (VPN’s) to give their own private pipe between device and their control point – and by doing this, creating an environment where data is far more secure.”

Organisations like Wireless Logic utilise their own Infrastructure-as-a-Service (IaaS) to create virtual networks interconnected back into the mobile networks and their own fully redundant data centres. In the case of Wireless Logic, their IaaS known as ‘NetPro’ delivers sector-leading technology with virtually zero capex to implement and integrate into a client’s own network. Assigning fixed/static IP to each data SIM gives additional security ensuring seamless two-way communication between device and control. Matt McPherson continues: “Infrastructures such as NetPro are providing levels of security that organisations would normally expect from significant IT investments. A large percentage of our total subscription estate has now adopted the NetPro VPN.”

Markets should no longer consider costs and challenges with deployment as barriers

The challenges of establishing secure M2M device networks can also be time consuming. This is particularly so when encountering device estates that are connected across multiple mobile networks. The traditional model has been for organisations to put all of their ‘connectivity eggs’ in one basket. The expectation of multiple costly VPNs with numerous APNs has often led to compromised solutions, often dictated by cost and time implications on the operation. Once more M2M platform managed services providers such as Wireless Logic are thinking outside the box to unify connectivity by enabling users to select one or multiple Mobile Network Operators (MNOs) and still work off one secure VPN. “M2M asset deployments should and must not be limited to a single MNO,” continues Wireless Logic’s Matt McPherson. “Platforms are now in place where asset portfolios can straddle several mobile networks with the customer controlling the entire deployment through one cloud-based window. Country and multiple-country M2M strategies must have the flexibility to select MNOs on their suitability – geo-optimised and with the best commercials.

Add to this initiatives such as our ‘oneAPN’ which enables customers to assign the same Access Point Name (APN) regardless of MNO, we are streamlining the processes by which assets can be connected easily and securely, often in the field, without the need for multiple and complex provisioning protocol.”

Vulnerabilities within the Internet of Things and M2M world will continue to be raised as more and more devices are commissioned across a rapidly growing number of vertical markets. And whether the device is ‘dumb’ or ‘smart’, the drive to limit cyber attacks and hacking will see further widespread sector standards so that the corporate and consumer world don’t become victims of this new technology revolution.

 

Find out more about our IoT solutions or get in touch to speak to one of our IoT connectivity experts.

Contact us

Recent posts

Article 30th August 2024

To face the global challenge of air pollution, an enemy that knows no borders, why not look to global connectivity solutions that transcend geographical barriers?

Read more
Article 15th August 2024

Iain Davidson, senior product manager, unveils what you need to know about Cat-1 BIS, a strong alternative to 2G, 3G and LPWAN

Read more
Uncategorised 9th August 2024

Read more
Wireless Logic

Please enable JavaScript in your browser to complete this form.

Please enable JavaScript in your browser to complete this form.

Please enable JavaScript in your browser to complete this form.

Please enable JavaScript in your browser to complete this form.

Please enable JavaScript in your browser to complete this form.

Please enable JavaScript in your browser to complete this form.

Please enable JavaScript in your browser to complete this form.

Please enable JavaScript in your browser to complete this form.

Please enable JavaScript in your browser to complete this form.

Please enable JavaScript in your browser to complete this form.

Please enable JavaScript in your browser to complete this form.

Please enable JavaScript in your browser to complete this form.

Please enable JavaScript in your browser to complete this form.

Please enable JavaScript in your browser to complete this form.

Please enable JavaScript in your browser to complete this form.

Please enable JavaScript in your browser to complete this form.

Please enable JavaScript in your browser to complete this form.

Please enable JavaScript in your browser to complete this form.

Please enable JavaScript in your browser to complete this form.

Please enable JavaScript in your browser to complete this form.

Please enable JavaScript in your browser to complete this form.

Please enable JavaScript in your browser to complete this form.

[contact-form-7 id="fd7df5e" title="WP - Gated Content - New one for Jen"]

Please enable JavaScript in your browser to complete this form.

Please enable JavaScript in your browser to complete this form.

Please enable JavaScript in your browser to complete this form.

Please enable JavaScript in your browser to complete this form.

Please enable JavaScript in your browser to complete this form.

[contact-form-7 id="20126" title="Generic Sales Contact V2"]

[contact-form-7 id="19345" title="Trial Request"]

Please enable JavaScript in your browser to complete this form.

Please enable JavaScript in your browser to complete this form.