Blogs -Who is Responsible for the Data Security of 50 Billion IoT Connections?

Who is Responsible for the Data Security of 50 Billion IoT Connections?


June 13, 2018

author

Beth Kindig

Lead Tech Analyst

This article originally appeared on IAPP.org, the International Association of Privacy Professionals.

“No matter what happens, don’t panic,” were the words used by hackers just before they hacked a 2014 Jeep Cherokee. It wasn’t your typical hack, where credit card information is stolen, or a denial of service attack is propagated, or a website is taken down. This incident involved disabling the transmission and brakes of a vehicle driving 70 mph. In other words, this is the kind of hack that could take someone’s life.

Car hacks make juicy headlines, but dating back as far as 2007, we saw researchers demonstrate how a generator could be destroyed. In 2014, hackers broke into a German steel mill and prevented a blast furnace from being shut down. As recent as last year, Norse and the SANS Institute released a study revealing 375 U.S. health care organizations were actively compromised between September 2012 and October 2013.

As the Electronic Frontier Foundation recently pointed out, the old security paradigm “felt that human beings were the problem and tech is the solution.” What the internet of things pushes forward is a reversal on the old paradigm that humans are the solution to the problem that technology creates.

If we look closer at the human supply chain and data security for IoT, there are three key players: manufacturers, developers and end users.

Here’s how they can advance the future with foresight (rather than the proverbial hindsight):

1)   Manufacturers

We are finding that many manufacturers can engineer connected parts but do not have the security staff or experience to protect the features. Automotive and medical device companies release embedded systems with no one on staff to respond to a vulnerability report.

The product cycle typically looks like this: The manufacturers have a limited budget, as with all product releases, their primary goal is user adoption – not security. As the researchers and hackers find security flaws, user adoption is increasing, and the manufacturer has to release a patch or issue a recall. By this time, cybercriminals have an open opportunity to exploit the embedded system or flawed IoT gateway.

Original equipment manufacturers should focus on security from the product design stage, which will involve additional in-house security professionals or dedicated partners. With an average of 25 vulnerabilities per device, interconnectivity demands rigorous protection. One approach to improve the R&D cycle is to generate more revenue from the IoT device in order to invest early in more security checkpoints. One medical device company saw 10 to 20 times the revenue when opting to give a device away for free and charge monthly, moving from charging for IoT products to IoT services. This move helps incentivize the manufacturer to keep the device or embedded system on the market.

Also, to lump all manufacturers together would be a mistake. Many large software companies who have always handled security well will continue to do so – no matter the number of connections or level of proliferation. Apple tends to be a front runner on how they handle security, however, manufacturers can learn to lean more on legacy-level security companies to help test, iterate or secure, post-production, the connections and systems they release. “Leave it to the experts” is as true now as ever.

2)   Developers

Nearly 40 percent of large companies, including Fortune 500 companies, are not taking proper precautions to secure the apps they build for customers. On average, large organizations spend $34 million on mobile app development, of which only 5.5 percent is allocated to ensure that mobile apps are secure. Much more attention and focus is given to design even as we see the number of cyber attacks grow. And if those numbers seem shocking, consider that 50 percent of the organizations devote zero dollars to mobile security.

The mobile hackers we see today are able to break into highly valuable data through the insecure app or public WiFi networks. The mobile app hacks of tomorrow are those of embedded automotive IoT systems, flying drones (weighing up to 50 lbs), medical devices and other high-risk devices. Fundamentally, the IoT is about core components such as sensors for measuring temperature or wind speed and actuators to initiate driving a car or injecting insulin. As more and more gateways and apps connect to these core components, especially those in motion such as vehicles and drones, we will have a sudden and urgent need for developers to consider security testing imperative.

The IoT gateway is a device in the field responsible for gathering data from sensors and communicating with actuators. These are installed in homes, control systems and automobiles. One solution is to create a security framework that uses public key cryptography to authenticate communication between remote devices and gateways. This will prevent both data access and also unauthorized signals. Another fix for developers, according to Luca Dazi, who presented at the JavaOne Conference in October 2015, is to employ a framework that uses public-key cryptography to certify new software updates before installation. Lastly, another security step is to generate unique passwords for each device to provide different variants that are combined to generate the master password.

Beyond individual efforts, open source communities also cannot be underestimated. The idea of inviting your peers to help you find the vulnerabilities in your software or app build is quite powerful, and an open source community may be the right antidote for a porous ecosystem of this magnitude.

3)   End Users

What responsibility does the end user have, if any?

It would be difficult to rely on end-user education, rather than a push for open standards, protocols and industry organizations playing the role in IoT privacy and security. For instance, when you buy a phone charger, you don’t expect to have to do your own testing to make sure it is safe, you just look for a Underwriter’s Laboratory code on it. The way this would translate into IoT security would be to bake the open standards and protocols into the products as a matter of course, and standard bodies would then make sure the devices comply with security.

As always, end-user trust will be a key differentiator in the IoT marketplace.

head bg

More To Explore

Newsletter

AI server rack and processor chip with green and gold vertical light streams in a futuristic data‑center background.

Nvidia Stock to See New Growth Catalyst; 35X Faster AI with Groq 3 LPX

At GTC this week, Jensen Huang stated the revenue opportunity for Nvidia’s artificial intelligence chips may reach at least $1 trillion through 2027, up from a previous target of $500 billion. While t

March 20, 2026
Palantir sign with overlaid stock market chart patterns.

Palantir Stock is Out of Favor, but is the Growth Engine Still Intact?

Palantir stock sold off 38% from November to February and is down about 10% year-to-date. Even so, it has held up better than many software peers given the software sector has taken it on the chin lat

March 13, 2026
Multiple monitors displaying stock market charts with a sharp red downward arrow indicating a market decline, viewed from behind an individual.

“Tech Bubble” Warnings Cost Investors a 550% Nasdaq-100 Run

Investors have been hearing “tech bubble” warnings for more than a decade — but instead of collapsing, the Nasdaq‑100 has gained 550%. If we look back ten years ago to 2015, headlines such as “Sell ev

March 06, 2026
Bloom energy storage units surrounded by circuit‑like lighting, with a modern city skyline in the distance.

My Top 2026 Stock Pick for the AI Boom

The market is fixated on when Big Tech will generate economic value from the $650 billion+ being poured into AI data center expansion annually. The market is missing the point. Monetization has never

February 27, 2026
Graphic displaying I/O Fund's 326% cumulative returns with an upward bar chart.

I/O Fund Jumps to 326% Cumulative Return, Ranking Among Wall Street’s Best

I’m pleased to share the I/O Fund’s audited 2025 return of 37%, bringing cumulative performance since our May 2020 launch to 326%. This represents a 294% lead versus popular tech ETFs and a 152% outpe

February 24, 2026
3D rendering of a glowing gold Bitcoin logo emerging from a grid of raised digital blocks with illuminated edges highlighting the Bitcoin symbol.

Bitcoin After the Cycle Peak: What Comes Next and How We’re Positioning

Bitcoin rarely rewards narrative-based investors for long. Time and again, it has shown a habit of reversing its dominant trend against the prevailing story of the moment. A large portion of the I/O F

February 13, 2026
A glowing gold S&P 500 line chart trending downward, with Magnificent Seven tech icons below.

S&P 500 Outlook 2026: Rising Volatility Risk and Key Support Levels

Since November 2021, when the equal-weight Mag 7 Index does not confirm a new high in the S&P 500, it has been a reliable signal of a weakening market environment. A similar divergence is occurring to

February 05, 2026
TSMC semiconductor manufacturing facility (fab) with the company logo on the building.

The Future of AI Stocks? TSMC Commentary Suggests AI Megatrend

TSMC is one of the least sensational management teams in the AI stocks space, yet management explicitly called AI a multi-year “megatrend” in their most recent earnings call, with demand now being pul

January 29, 2026
2026 Big Tech AI strategy comparison: Apple, Amazon, Google, Meta, and Microsoft transitioning to AI infrastructure monetization.

The $530 Billion AI Question: Which Big Tech Stock is Winning?

Big Tech is expected to invest $530 billion for building AI infrastructure in 2026, while the path to near-term monetization remains a question mark. As investor scrutiny around capital expenditure in

January 22, 2026
A futuristic city designed like a glowing circuit board, with the Palantir logo at the center.

Palantir Stock 2026 Forecast: Is Its High Valuation Sustainable?

Palantir’s stock has defied gravity, delivering steady performance that no other AI software stock has come close to matching (yet). For investors, the Palantir thesis is two-fold: the company must co

January 15, 2026
newsletter

Sign up for Analysis on
the Best Tech Stocks


Copyright © 2010 - 2026