No flaws found in OpenVPN software. Our response to the CVE-2019-14899 vulnerability report.

IoT Data

Recap from the October 29th, 2019 CISO/Security Vendor Relationship Podcast

by Julie McLelland

The Internet of Things (IoT) means everyday objects, such as smart plugs, lightbulbs, locks, coffee machines, and motion sensors can connect to the internet and creating a copious amount of data. This data can be used in ways we could not have imagined even a few years ago. A forecast from International Data Corporation (IDC) estimates that there will be 41.6 billion connected IoT devices generating 79.4 zettabytes (ZB) of data in 2025. For reference, one zettabyte is equivalent to one billion terabytes, or one trillion gigabytes.

Steve Prentice explained in this week’s Cloud Security Tip “IBM, Forrester, and others have suggested that maybe 1 percent of data generated from IoT connectivity is being used, mostly for immediate learning or predictive activities.” So what exactly is happening to the other 99 percent?

How Businesses Can Utilize Data

It’s easy for organizations to become overwhelmed with their IoT data, but it’s important to not get “analysis paralysis” and do nothing with it. Here are three essential ways every business can utilize their data:

As Steve said in the Cloud Security Tip: “Data always has value, somewhere, somehow.” Data can be of huge value to your business if you use it properly — however, it can also be used against you if you don't secure it properly.

Protecting Data

There are three key components to formulating an IoT data security strategy: a distributed strategy, an immutable, and an ephemeral strategy. It’s important to know your data isn’t just lying around, open to the public, so having strategies or systems in place is critical.

An organization can connect all the IT infrastructure (whether distributed, immutable, or ephemeral) pertaining to the IoT solution and IoT devices together into a single network — and this private network allows for secure communications between the deployed IoT devices and the infrastructure that controls or collects data from them.

By utilizing the OpenVPN business VPN, Access Server, as your IoT security solution, you can create your own IoT private network to conduct and establish communications with your IoT devices securely, and you can prevent attacks that seek to alter or eavesdrop on IoT data. This allows you to store and analyze, while also ensuring that only authorized IoT devices can become part of your private network, keeping it protected and secure.