The issue of security for today’s rapidly growing internet of things (IoT) is not a new one. However, much of the discussion has focused on device security and data security for individual companies. Until now, there really hasn’t been an analysis of the single thing that makes the “I” in “IoT” tick – the internet, or more specifically, the public internet.
In fact, from a security perspective, the public internet has always been more a best-effort network rather than the best-in-class network needed to ensure the confidentiality, integrity and availability of today’s transactions. It was originally conceived as a network with built-in redundancy for academics and researchers to share data, not protect or authenticate access to it. In short, it was never designed to be a secure environment.
This has come into sharp focus in the last few years, with cyber calamities like DDoS attacks on an unprecedented scale. These attacks have changed the rules of the game, taking down business web servers worldwide and hitting some of the world’s largest banks, retailers, media companies, DNS providers, social networks, and news outlets.
As a result, with the increasing level of business transactions being put online and the rise of a new ecosystem of automated processes emerging from the IoT, the public internet has reached a tipping point that now presents a distinct systemic risk that companies must address more urgently.
A growing systemic risk
Unlike a threat that jeopardises one segment or department of a company, a systemic risk is one that can bring an entire operation to a halt and cause a total failure of a business. And this is precisely the risk that many businesses continue to take by relying on the public internet.
Specifically, the public internet presents a systemic risk to businesses in two ways: connectivity to hosted cloud environments to both use and provide existing services; and connectivity to IoT processes to pursue evolving business opportunities.
If, for example, you’re a manufacturer that wants to share sensitive engineering data with your overseas suppliers, you need connectivity. Or if you’re a cargo shipping firm that wants to track your customers’ valuable goods when they land in port, you need connectivity. And if you’re an airline that wants to share private passenger data with car hire and hotel firms, you need connectivity. This connectivity all comes from the public internet.
And all this needed connectivity is adding up to some huge amounts of data – and risk. Just one second on the internet now, according to Internet Live Stats, includes over 54,000 Google searches conducted and more than 2.5 million emails sent. By moving more and more data online, businesses are heightening their reliance on the public internet and increasing the exposure of their data to potential risks.
A losing battle
Despite efforts to encrypt and secure data, attacks are still on the rise.
In fact, 2017 was the worst year in recent memory for cyberattacks. According to a report from the Online Trust Alliance, there were 159,700 cyberattacks targeting businesses. What’s more, although spending on cybersecurity is expected to exceed $1 trillion from 2017 to 2021, the cost of cyber-risk is already estimated to be in the range of trillions of dollars per year, and hit $6 trillion a year by 2021.
Critically, a rapidly growing attack surface is being created by IoT transformation, presenting a host of new doors for hackers to unlock. Most companies moving into cloud and virtualised environments are not currently equipped to protect sensitive information and need to be able to move data and provide services in a private and secure manner.
As a result, as businesses explore new opportunities and use cases for IoT, they must come to terms with the fact that the public internet is no longer fit to provide the reliable, robust and secure global connectivity that is imperative to fulfil the promise of IoT.
A private, isolated network
IT decision makers need to recognise that in order to adopt IoT and cloud services as part of their digital transformation strategies, the systemic risk of the public internet must be squarely addressed. But solving the problem is reliant on educating companies on the risks of continuing to utilise the public internet and offering them realistic solutions.
In the last several years, the most effective answer that has emerged to this problem has been the deployment of a private, isolated network. As its name implies, this network minimises business risk by running completely independent from the public internet.
In particular, a private, isolated network enables businesses to meet four criteria that are vital to the new demands of the IoT era:
- Security, privacy and isolation from the public internet in order to protect valuable corporate and public data and assets.
- Connectivity global in scale but flexible enough to address specific vertical market needs.
- High capacity, high speed, and low latency to meet the needs of new use cases.
- Ability to view and manage all members of the network environment.
The last of these is particularly crucial, because it pertains to knowing not just the rights and privileges of the devices accessing a network. It means authenticating that individuals or machines behind the keystrokes or commands are exactly who or what they are supposed to be.
The rising level of business done online and the promising new world of IoT processes have raised the stakes for the safeguarding of today’s business data to an all-time high. In an age when the public internet increasingly presents a systemic risk, companies that want to conduct business and transfer data with certainty, security and privacy cannot rely on it.
They must make it an imperative to integrate the use of private, isolated network to protect and authenticate their data and processes. As businesses seize the opportunity of the IoT, they risk compromising their data on a public internet never intended for that purpose.
Phil Celestini, Senior Vice President and Chief Security and Risk Officer, Syniverse
Image source: Shutterstock/a-image