There’s a good chance that the benefits of the Internet of Things (IoT) could make a huge difference to your organization, but how do you get started?

With around 30 billion IoT connected devices due to be in use by 2020, the IoT is clearly here to stay and the benefits in business are immense. Improved communication, enhanced automation and increased productivity are just a few of the benefits on offer. And, if you’re in business, then you’ll know that these benefits alone are crucial.

However, the IoT world is still relatively new and many organizations are apprehensive when it comes to introducing it to the workplace. Rather than leaving you adrift as your competitors surge forward, we’ve put together some tips on how to introduce the IoT into your organization.

Meet with IT Professionals and Create a Plan

The IoT may seem fairly straightforward in terms of how all the various devices connect, but the truth is that the IoT can be highly complex. Therefore, you need to speak to IT professionals. With their years of expertise in IT innovation, they will be able to recommend the correct technology and how you can begin to implement this into your existing IT network. Otherwise, you will never experience the full range of benefits that IoT can provide.

Understand Why You Need the IoT

If you want to embrace the IoT then you need to understand what it can do for your organization. There are, as previously stated, many benefits on offer from adopting the IoT into your operations, but not all of them will apply to your needs. And that’s why you need to identify the key problems within your business that the IoT can solve. Perhaps it’s increased productivity, perhaps it’s enhanced data processing. Either way, in order to implement the IoT correctly, you have to understand these problems from the very start.

What Can Your Current Setup Provide?

Introducing the IoT doesn’t mean that you have to start from scratch when it comes to your existing IT infrastructure. Many business owners, however, worry that the costs will spiral out of control, but this couldn’t be further from the truth. Sure, there may be the need for certain upgrades to be made to accommodate IoT technology, but plenty of your existing technology will be able to provide a seamless transition. Carrying out a full analysis of your equipment and understanding its capabilities will allow you to identify the areas which need updating.

Establishing Good Staff Training

As with any new form of technology, the IoT will require a certain level of training for your staff. Their existing knowledge of the IoT and the level of interaction they will have with the IoT in your organization will vary, but training is essential. This can be offered either in-house or by external training courses that specialize in training in IoT practices. Once your staff has received the relevant level of IoT training required you’ll find that the integration process is as hassle free as it can be.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


The Internet of Things (IoT) has revolutionized the way we do business thanks to the accessibility on offer, but are you getting the best out of it?

More and more organizations are using IoT devices to help improve their business operations and it’s estimated that around 31 billion IoT devices will be in use by 2020. The aim of these IoT devices, in business, is to maximize productivity and help organizations deliver fantastic customer experiences. Understanding how they can achieve these objectives, however, isn’t as simple as just plugging the devices in and letting them get to work.

To help you appreciate which areas of your business they can improve, we’ve put together a list of the best ways to use the IoT in business.

Analytics

Due to the vast range of IoT devices now available, it’s possible for businesses to measure and analyze almost anything you can imagine. Say, for example, you want to understand the usage of forklift trucks in your warehouse. Sure, you could ask people in the warehouse for anecdotal evidence, but this would only be a rough estimate. If, however, you have an IoT sensor which measures movement, you can calculate some seriously precise data. And, with this data, you can then analyze it more closely and determine much more effective solutions for improving your forklift usage.

Understand Your Customers

Many IoT devices allow you to monitor the behavior of your customers and this gives you a significant edge in understanding their preferences. By collecting based on your customers’ usage of your products, you can begin to build a list of insights which detail their exact needs of your customers. This gives you the opportunity to enhance your products and make them much more beneficial to your customers in future. Accordingly, customers are more likely to stay loyal due to the enhanced experience.

Asset Management

Tracking and maintaining assets has always been a difficult task for businesses, but the IoT has opened up new opportunities that promise to make it easier than ever before. Temperature monitoring devices, for example, can be installed into refrigerators and data then transmitted to an online portal. This can provide immediate and instant reference data all in one place so, if you work in a store with numerous refrigerators, you can immediate see how they are performing without having to go and check each individual unit.

Enhance Your Supply Chain

A good supply chain is crucial for good business and the IoT can deliver some amazing benefits for your supply chain. The IoT allows constant updates to be logged regarding your supply chain and this ensures excellent visibility for stock and products. Delays on parts and other stock issues can be identified exceptionally quickly and this means that these problems can be solved and improved just as quickly. With a more efficient supply chain in place, you’ll also be able to deliver a much better customer experience.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


With Internet of Things (IoT) devices becoming more prolific at work, their security risks are increasing. In particular, botnets are posing a major threat.

Botnets have been associated with hacking since the start of the 21st century and don’t show any signs of disappearing soon. Therefore, it’s no surprise that hackers are adopting these services into their attacks on IoT devices. The aim of a botnet is to create a huge network of infected computers connected to the internet to carry out DDoS attacks, spam campaigns and steal data. And, with the proliferation of unsecured IoT devices now online, it’s not hard to see why they’re so attractive to hackers.

One botnet which has been creating a few headlines recently is Reaper, so it’s a good place to start understanding their method of operation and how you can protect yourself.

The IoT Reaper Comes to Town

IoT devices, partly due to their recent emergence, aren’t exactly the most safe and secure devices to be connecting to your organization’s network. Sure, many of them are safe, but there are so many reports of devices being released with vulnerabilities in their code, a lack of firmware updates and default password exploitation issues. Accordingly, the warnings attributed to IoT devices need to be taken seriously. And when it comes to botnets such as Reaper, you can begin to understand why.

The Mirai botnet was the first big hack which took advantage of shortfalls in IoT security and its legacy is Reaper. Evolving the operation and build of Mirai (Reaper even shares some code with it), Reaper is a more sophisticated piece of malware. Mirai’s approach was to act purely as a password cracker, but Reaper is taking nine different approaches to exploit known vulnerabilities in devices manufactured by Linksys, GoAhead and NetGear to name but a few.

Reaper has the potential to create a huge botnet army and, with its myriad infection methods, could carry this out with much more ease than Mirai ever managed. Security researchers Checkpoint even estimate that around one million networks have been scanned in order to begin recruiting vulnerable devices. Reaper is also built to ensure that it can receive regular updates through new script updates and indicates a potential for the malware to be regularly strengthened.

Thankfully, the number of recruited bots has remained relatively low compared to initial estimates with around 10,000 to 20,000 drones being active at any one time. Experts suspect this may be down to poor coding, but with the potential for new updates to be patched into the malware, this could be rectified very quickly. A further benefit to consumers is that the hardware providers being targerted are tight on security and regularly issue firmware updates.

Keeping the Reaper at Bay

Allowing automatic firmware updates – and regularly checking manufacturers’ websites/social media for security updates – is paramount to keeping your organization’s IoT devices secure. Not only can botnets launch global attacks on computer networks, but they can also slow down individual devices and render them redundant.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


Hackers aren’t the only threat to the security of your organization’s Internet of Things (IoT), your employees can be just as culpable for security risks.

Let’s face it, the IoT is a relatively new phenomenon and, even though most of your employees will have smart devices at home, the majority of your workforce won’t be aware of the many security dangers. It’s this lack of knowledge which can lead to major security flaws which leave your network open to hackers and their accompanying chaos.

However, humans have a huge capacity for learning and if you can ingrain the basics of IoT security in the business culture, you’ll find that your employees are soon on top of things. And this knowledge can provide an extra layer of defense, so let’s take a look at how you can provide this.

Ban All Guest Access

Many organizations provide guest access to, at the very least, their Wi-Fi network so that visitors can check emails, liaise with their own staff and, more likely, check Facebook! However, whilst this is a generous gesture, it opens your network up to a whole host of security risks. If there’s a freely available guest network then it’s likely that everyone in your organization will know the password and it can be passed on to any visitors.

Now, you’re never going to know every single visitor to your company and, crucially, you’re never going to know how secure these visitors’ devices are. Therefore, it’s a highly dangerous move to allow your employees to grant free access to any section of your network. The simplest way to combat this and prevent bad security practices is to ban all guest access to your organization’s Wi-Fi. It may seem drastic, but it will really hammer home the security risk to your employees.

Improve the Password Culture

Passwords are one of the oldest forms of computer security, but they’re also one of the most effective. IoT devices, though, have a reputation for coming pre-loaded with highly weak default passwords, so the effort required to hack them is relatively low. Changing not only default passwords, but also regularly changing existing passwords remains a highly important task to secure your smart devices.

Your employees are likely to be highly busy, though, so changing their password will tend to fall down their list of things to do. This is where you, as an employer, need to ensure that regular reminders are sent out to your employees to indicate when passwords require changing. Ideally this should be between 6 – 12 weeks of the last password change and the best way to enforce this is by restricting access to applications if the password is not changed.

Whilst employees will initially grumble about having to change their password and remember a new one, these complaints will soon subside and employees will become compliant with the process.

Regular Training

As mentioned in my opening, the IoT is a new phenomenon and the collective knowledge of your employees will be limited. And that’s why you need to make sure that your staff are given regular training sessions on the importance of IoT security.

Ideally, the IT induction that all new starters take should include a section on IoT security; after all, almost of all your employees will bring a personal smartphone into work and, of course, certain employees will be issued with company laptops and smartphones, so the need for good security practices from the off are vital.

It may seem time consuming to complete inductions and regular refreshing training, but the enhanced knowledge among your workforce will ensure that your networks remain safe from the most simple (yet damaging) IoT security mistakes.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


The Internet of Things (IoT) can help run almost any device in use in your organization, but this also means you could be hacked by a fish tank.

This may sound highly unlikely, but this is exactly what happened to a North American casino and underlines just how vulnerable IoT devices are. It also demonstrates how every single IoT device, no matter how insignificant and harmless it may appear, is at risk. Hackers, after all, do not discriminate – if there’s a way to gain access to a network then they’ll exploit it.

As this is one of the more unusual attacks to have affected an IoT device, I’m going to take a closer look at it before advising you on a few tips to avoid getting hacked by a fish tank.

Hacking the Tank

The fish tank – which was situated in the unnamed hotel – had been installed with state of the art sensors which monitored and regulated factors such as water temperature, saline levels and release of food. Making devices such as these sensors compatible with IoT technology allows the tank to be controlled remotely, but this accessibility also opens up such IoT devices to the interests of hackers. Although the hotel had security measures in place, they were evidently not secure enough.

Many IoT devices lack advanced, internal security technology so any external security measures need to be as advanced as possible to pick up the slack. In this particular case, the fish tank’s sensors were hacked which allowed the hackers to transmit 10GB worth of data to a remote server based in Finland. The casino’s existing security tools were able to identify that data was leaking externally, but were unable to identify where from and where it was being transmitted to.

Thankfully, security experts Darktrace were able to pinpoint where the vulnerability was and were able to advise the casino to disconnect the fish tank sensors immediately. 10GB worth of data may not sound like a huge amount of data in this day and age, but when you consider the amount of personal and financial details a casino may hold, 10GB could cause a lot of concern for any patrons of the casino.

Securing IoT Devices

Being hacked through a fish tank is a highly embarrassing security flaw for any organization, so understanding how to secure IoT devices is paramount. Make sure you’re implementing the following security measures with IoT devices:

  • Change Default Passwords – Many IoT devices come preloaded with a default password and, by leaving this in place, you’re reducing the number of guesses and effort that a hacker needs to put into brute-force hacking the password. It’s estimated that around 15% of IoT device owners do not change this default password, so make sure you change this as soon as the device is installed.
  • Install Firmware – As I’ve previously mentioned, the security technology loaded onto IoT devices is sometimes sadly lacking. However, even worse than poor security software is outdated security software. And that’s why it’s crucial that any firmware updates are installed immediately to patch any potential vulnerabilities.
  • Separate Networks – The number of IoT devices operating in any one organization can easily run into the hundreds. Essentially, this means that there are hundreds of routes into your network and this could cause real chaos if just one device is breached. Therefore, penning off IoT devices into separate networks is a preventative step which can limit the reach of any hackers.

For more ways to secure and optimize your business technology, contact your local IT professionals.

 

Read More