IoT and Security – is there a skills gap?

By Richard Dornhart, National Security Practice Mananger, Data#3

[Reading time: 1 min]

In the wake of technological advancements in recent years, technologies such as the Internet of Things (IoT) have seen rapid adoption in the business world globally.

I came across a recent Gartner article that provided some interesting views on the IoT trends over the coming two years. The author suggests that most organisations are not yet equipped technologically to handle the IoT technologies flooding the market. I would have to agree, and what I’m seeing in the market is that this is reinforced by the shortcoming of specialised skills in this area, which is one of the biggest challenges facing businesses today…

IT SecurityIn this recommended reading for CIO’s and IT executives, this article makes good points about how IoT technologies are entirely different from other innovations of the past, such as operating systems (OSs) like Windows and iOS. For instance, companies will need to invest in time and deep technical skills to understand the implications of processor choices, or how IoT-specific operating systems will suit their future needs.

And then, there is the increased security risks facing the platforms and operating systems of these IoT devices. Companies will need to develop new security technologies that protect IoT devices from information and data breaches, as well as physical tampering.

Do you have a skills gap? With fragmented security solutions and a scarcity of IoT security specialists, organisations must start planning to stay ahead of the curve. Data#3 can provide your business with the right platform to optimise and manage your IT security environment, now and for the future. Learn more about our approach.

Tags: Internet of Things (IoT), Security



Information protection in an age of information theft

Managing and safeguarding data across various apps, clouds, and endpoints is an uphill battle. It’s led to organisations relying on…

Customer Story: Knight Frank

Cloud Transition an Azure Success Story for Knight Frank Download Customer Story Contact a Specialist Objective…

3CX Desktop App Critical Vulnerability Alert

The Australian Cyber Security Centre has issued a warning about a new supply chain attack that has targeted a…

Managed Services eBook
Your guide to Data#3 Managed Services

Digital disruption is causing significant changes in the workplace, leading to higher expectations for access, security, and support regardless of…

JuiceIT Guest Blog | How XDR can help when time is of the essence

The only thing worse than cyber threats is an inability to detect those threats in time. Organisations need the…

JuiceIT Guest Blog | Veeam Platform: Reliable and Fast Recovery from Ransomware in a Hybrid World.

Ransomware attacks have become a growing concern for organisations of all sizes in Australia and New Zealand, resulting in significant…

Customer Story: Pernod Ricard Winemakers

Azure Migration gives Pernod Ricard Greater Flexibility and Improved Performance Download Customer Story Contact a Specialist…

Why would you deploy SASE?
If Secure Access Software Edge (SASE) with Cisco Meraki is the destination, what does the journey to get there look like?

Firstly, let’s set the scene. The term SASE was first mentioned by Gartner Analysts in July 2019 and Gartner continues…