Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    image fx (67)
    Improving LinkedIn Ad Strategies with Data Analytics
    9 Min Read
    big data and remote work
    Data Helps Speech-Language Pathologists Deliver Better Results
    6 Min Read
    data driven insights
    How Data-Driven Insights Are Addressing Gaps in Patient Communication and Equity
    8 Min Read
    pexels pavel danilyuk 8112119
    Data Analytics Is Revolutionizing Medical Credentialing
    8 Min Read
    data and seo
    Maximize SEO Success with Powerful Data Analytics Insights
    8 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: As the Internet of Things Mobilizes, Safeguarding the Cloud Is Our Prerogative
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > Data Management > Best Practices > As the Internet of Things Mobilizes, Safeguarding the Cloud Is Our Prerogative
Best PracticesCloud ComputingCulture/LeadershipPolicy and GovernancePrivacyRisk ManagementSecurityTransparency

As the Internet of Things Mobilizes, Safeguarding the Cloud Is Our Prerogative

Dan Matthews
Dan Matthews
7 Min Read
SHARE

Test case: the connected car

The idea of the connected car is a reality. Connected car technology precedes cars from Google and Apple that will help bring the Internet of Things (IoT) to our doorsteps in a big way by the year 2020.

Test case: the connected car

The idea of the connected car is a reality. Connected car technology precedes cars from Google and Apple that will help bring the Internet of Things (IoT) to our doorsteps in a big way by the year 2020.

More Read

hybrid cloud networking
Hybrid Cloud Networking Is The Silent Disruptor Of SMEs
FedCyber.com Cybersecurity Summit on Wednesday, September 28
Docker and DevOps: The Skills Needed to Get Ahead in the Cloud Market
How Cloud Technology Can Be Integrating in Schools
Dreamforce 2011, the Recap

Yet already we have the news of the Fiat-Chrysler hack test that resulted in the recall of 1.4 million vehicles. Hackers were able to take control of a moving car over the internet. 

Recently, I’ve been thinking a lot about how connected cars are a harbinger of the IoT. Eventually, the theory goes that autonomous, connected cars will use data transmitted by all the things around us in connected cities to make decisions in real time. 

This presents a scary scenario. Of all the things that will make up the IoT, how many will be vulnerable to hacks, similar to what just happened to Fiat-Chrysler? How many of the cars will have Achilles Heels?

Danger zone: the IoT

From all accounts, the IoT promises to be huge for business in terms of how we use big data. Each object equipped with sensors and linked to the internet will affect how we’re using data points. Manipulation of the data could be more insidious than hacks that cause malfunctions. Hackers could potentially falsify data to create chaos. Corporations could manipulate and falsify data to create conditions favoring their product. Further, as is the case currently with Diane Feinstein’s Cybersecurity Information Sharing Act, the government could demand access to data and give corporations the right to collect and store more of it than we ever thought possible.

The truth is that in any cyber infrastructure where there are built-in access points, and encryption protocols are not applied consistently to sets of data, there will always be the possibility of hacks—the data will always be available to prying eyes.

Cloud security: our prerogative

Are we ready for a connected world without data security accountability—a wild west of data? In order to be proactive here, we’ve got do our part in the business world—we’ve got to secure data on the cloud. The following is a rundown on doing just that.

  • Transparency

If your organization has an IT department, talk to the CIO (Chief Information Officer) or CSO (Chief Security Officer) and make sure you are up-to-date on the measures they are taking to ensure cloud security. If this information isn’t readily available to you in a form you can easily digest, make a suggestion. They’ll be happy you care and respectful of your concern.

If your organization doesn’t have anyone in charge of information security and is simply using the available cloud technology, talk to appropriate parties about what you can do. Spearheading the discussion will do everyone a favor.

  • Staying current

IT departments are in charge of staying current on cloud security solutions. Data encryption methods, effective data loss prevention software (DLP), anti-virus and anti-malware solutions—all are important for cloud security. Moreover, CSO’s can set requirements for adopting a cloud application provider—they can request to see information verifying the provider’s compliance with common standards such as the CSA Cloud Control Matrix, and they can review technologies and certifications.

To protect against external threats, they can take additional measures such a two-factor authentication, one-time passwords, and Distributed Denial of Service protection. To ensure no one but those who are authorized to do so can access the cloud application, they can use an Identity Federation Solution, which relies on your organization’s User Directory for authentication. There are many ways for IT to stay current on cloud security. If you are an IT professional, or just interested, consider these 14 tips to secure cloud applications from CSO Online.

  • Implementation

Where do you stand in the ladder of implementation? As I’ve discussed so far, determining the means to cloud security is IT’s job, but implementation is a company-wide affair. Owners and CEOs can ensure implementation by making sure it’s a priority. They can urge Human Resources to stay on top of employee concerns and gauge employee satisfaction with cloud applications and security solutions. They can prioritize effective communication through management, and they can organize events, such as seminars and workshops, to help educate employees.

In turn, employees can make sure their credentials are safe. No writing down passwords and putting them anywhere near the computer or on a post-it note, and don’t store them on an unprotected, shared drive; make sure passwords are unique, abstract, and incredibly hard to crack. Don’t download cloud apps that haven’t been sanctioned by your employer.

Overall, communicate with the IT department when considering any sort of cloud activity that hasn’t been pre-approved and prescribed by your employer.

Paving the way: we’re the architects

The bills we pass now, the decisions we make about storing, and securing or sharing big data, will have a direct impact on the IoT of tomorrow. These decisions will determine whether big data, the cloud and the IoT are ultimately a positive or negative experience for mankind. Do we want a giant, vulnerable web sharing information about us constantly, information that could fall into the wrong hands? Or do we want an enclosed, safe system? It’s up to the people whose businesses deal in big data to decide.

 

 

Share This Article
Facebook Pinterest LinkedIn
Share
ByDan Matthews
Dan Matthews is a freelance writer who specializes in tech, business, and finance. You can find him on Twitter @danielmatthews0.

Follow us on Facebook

Latest News

image fx (2)
Monitoring Data Without Turning into Big Brother
Big Data Exclusive
image fx (71)
The Power of AI for Personalization in Email
Artificial Intelligence Exclusive Marketing
image fx (67)
Improving LinkedIn Ad Strategies with Data Analytics
Analytics Big Data Exclusive Software
big data and remote work
Data Helps Speech-Language Pathologists Deliver Better Results
Analytics Big Data Exclusive

Stay Connected

1.2kFollowersLike
33.7kFollowersFollow
222FollowersPin

You Might also Like

The Cyber Power Index

0 Min Read

Why Predictive Analytics is Important and More

7 Min Read
big data strategy
Best PracticesBig DataBusiness IntelligenceBusiness RulesCulture/LeadershipData ManagementInside CompaniesITJobsPolicy and GovernanceSoftware

Finding the Right Sponsor for Your Big Data Project

8 Min Read
transparency in news feeds
Best PracticesCulture/LeadershipPolicy and GovernanceTransparency

Why Algorithmic Accountability Is Needed Now

5 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

AI chatbots
AI Chatbots Can Help Retailers Convert Live Broadcast Viewers into Sales!
Chatbots
ai in ecommerce
Artificial Intelligence for eCommerce: A Closer Look
Artificial Intelligence

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?