Security of critical concern in energy IoT

Posted by Eric Reichel, Vice President Product & Operations on Apr 14, 2016 11:00:00 AM
Find me on:

 IT-Ebook_cover_noCTA.jpg

Final in a 4-part series... 

The dawn of the Internet of Things is upon us, and the technology world is abuzz with all of the spectacular new capabilities that IoT will make possible (beyond what’s already happening). But if there’s one thing people are talking about even more than IoT, it’s cybersecurity. As all types of organizations seek to capitalize on the promise of digital transformation, they also become more vulnerable to disaster than ever before. 

It seems every week there’s a new cyber attack making headlines. At Blue Pillar, we’re acutely aware of the seriousness of cyber attacks, especially since our products apply IoT concepts to connect critical energy infrastructure. As all sorts of industrial machinery is brought online and cyber attacks become more prevalent, it has become clear that targeted attacks can do more than expose sensitive information, they can grind an organization’s operations to a halt and even endanger human life. What’s scarier is that many organizations won’t even know they’re being attacked until it’s too late. In a 2015 Ernst and Young survey related to IoT, 56 percent of executives said it was “unlikely or highly unlikely” that their organization would be able to detect a sophisticated attack. In other words, damage control would be the best they could do.

It’s clear that for any company working toward digital transformation and IoT initiatives, cybersecurity must be a top priority. While most experts agree that no system is completely invulnerable to attack, there are many steps organizations can take to mitigate the risks. That includes working with technology partners who acknowledge the critical nature of cybersecurity and take proactive, thorough measures to guard against attacks.

At Blue Pillar, for example, we’ve built robust security features into our IoT platform, such as strict authentication protocols, audit capabilities, and encrypted data transfer. More than that, we take the extra step to have our platforms independently assessed through mock attacks that expose weaknesses and help us continually strengthen our defenses.

While cyber criminals may never go away, we’ll never stop working to stay one step ahead of them. Ultimately, our goal is to help organizations spend less time worrying about security, and more time bringing the benefits of IoT to their companies and their customers.

Learn more by downloading our new eBook, Energy Network of Things Series - The Next Big Thing in IT: Energy IoT.

Topics: Internet of Things