Story image

Securing IoT infrastructure with edge computing

21 Aug 2018

Article by IMS Evolve technology services head James Sinton

The Internet of Things (IoT) is creating opportunities for businesses across every industry. However, the big question for the C-suite is how do they ensure their business is taking full advantage of it?

There are a number of vendors offering different ways to roll out the technology and so selecting the right provider for each company is no mean feat.

One significant consideration is whether or not to invest in IoT-enabled equipment or instead, look for a way to leverage the data that is sitting in an organisation’s legacy devices.

Many businesses do not want the upfront costs associated with ripping out and replacing their existing infrastructure for IoT-enabled devices and so, adding an IoT layer to the equipment already in place offers an attractive alternative.

How can businesses implement this securely?

Take the cold chain in the food retail industry as an example.

The cost of replacing every in-store fridge, freezer or food delivery van is simply not of immediate appeal for a large retailer, though the addition of IoT technology can directly benefit its core business objectives of selling produce by improving food quality, reducing waste and, ultimately, delivering a better customer experience.

In addition, for the food retail industry and many others, the legacy infrastructure within organisations often has mounds of untapped data that can prove vital in ensuring IoT deployments meet these goals.

Security is a crucial consideration for businesses looking to adopt IoT technology.

Not only do they need to keep valuable data safe, but it is vital that all technology complies with increasingly stringent data protection regulations.

This is where a project incorporating legacy infrastructure can come up against a roadblock – that as non-connected devices, legacy infrastructure does not have the benefit of in-built security.

Not only can this pose a challenge for protecting the data generated by legacy machines, but once the devices are connected to the business’s main network, there is the risk of a potential breach to contend with. 

This is where edge computing comes in.

This refers to an architecture where data, rather than being hauled into the public internet and large corporate networks for analysis, is processed at its source at the edge of the network.

This improves security because connecting straight to the cloud can leave the infrastructure and the data it generates vulnerable.

This is an open invitation to cyber criminals to exploit company data, exposing not only those devices but the entire network to security risks such as Distributed Denial of Service (DDoS), man-in-the-middle attacks and hacking.  

Edge computing puts processing power at the source of IoT data, meaning that not only can data be analysed as soon as it is generated, but secured.

By having computing power at the edge, an IoT deployment can be designed with an inbuilt security layer.

As IoT deployments move into sectors where increasingly critical devices and data are being handled, it is vital that the data is protected.

For example, in healthcare, as medical equipment becomes IoT-enabled, there is no room for error.

Regardless of the device, there must be built-in edge computing capabilities that allow the device and the data it generates to be protected.

As businesses undergo digital transformation, there is a careful balance to be struck between value, cost and security.

IoT has the potential to drive business value, and legacy infrastructure IoT solutions allow the benefits of the technology to be reaped without the cost of ownership.

The final piece of the puzzle has to be security.

For the majority of businesses, security has to be a number one priority and any IoT solution that does not account for security is simply not viable.

By adopting a solution with edge computing capabilities and baking in security from the get-go, businesses can move forward with innovative technologies without being hampered by security risks. 

Norwegian aluminium manufacturer hit hard by LockerGoga ransomware attack
“IT systems in most business areas are impacted and Hydro is switching to manual operations as far as possible.”
Slack doubles down on enterprise key management
EKM adds an extra layer of protection so customers can share conversations, files, and data while still meeting their own risk mitigation requirements.
Security professionals want to return fire – Venafi
Seventy-two percent of professionals surveyed believe nation-states have the right to ‘hack back’ cybercriminals.
Alcatraz AI to replace corporate badges with AI security
The Palo Alto-based startup supposedly leverages facial recognition, 3D sensing, and machine learning to enable secure access control.
Unencrypted Gearbest database leaves over 1.5mil shoppers’ records exposed
Depending on the countries and information requirements, the data could give hackers access to online government portals, banking apps, and health insurance records.
Mozilla launches Firefox Send, an encrypted file transfer service
Mozille Firefox has launched a free encrypted file transfer service that allows people to securely share files from any web browser – not just Firefox.
Ransomware’s decline equals cryptomining’s rise
ESET’s Security Days Conference recently took place to go over the current threat environment and what to look out for next.
IoT and DDoS attacks: A match made in heaven
A10 Network’s Adrian Taylor uses findings from a number of reports to illustrate his point that advances in technology are facilitating cybercrime.