Your browser is out-of-date!

Please update your browser to view this website correctly.

Sorry, but the version of Internet Explorer you are using is not supported. Please click here to upgrade your browser.
Tap to Call

Author: Joe Oliveri, Vice President and General Manager, Tyco Integrated Security
Published: Fri, Feb 10, 2017

While some companies are still building strategies to harness the promise of the Internet of Things (IoT), many Industrial organizations are putting real solutions in place and maximizing operations by utilizing the IoT. As applications of this connected infrastructure move from ideas to real-life implementations, the need for an understanding of how it integrates the physical with the virtual, and introduces a host of new and emerging cybersecurity threats, is crucial for properly protecting your business.

The IIoT applies connectivity and automation to the commercial space, integrating cyber systems with physical systems like building management, video surveillance and physical access control. Within this ecosystem, a compromised device can be used to disrupt other devices and/or enterprise systems thereby giving rise to cascading threats.

Here are some statistics to show just how big of a concern this is:

  • 70 percent of connected devices contain security vulnerabilities - HPE
  • 56 percent of organizations are unlikely to detect sophisticated attacks – EY GISS
  • 36 percent of organizations do not have a threat intelligence program in place– EY GISS
  • 25 percent of enterprise attacks by 2020 will originate from IIoT vulnerabilities - Gartner

While organizations can see great returns from implementing IIoT solutions, integrating physical security measures with cybersecurity protection must be a top priority to mitigate risk, from concept to implementation.

Check back for future posts from me that focus on best practices for securing the IIoT.

Leave a Reply

Your email address will not be published. Required fields are marked *

An error occurred processing the form. Please try again later.

Copyright © Tyco Integrated Security LLC ("Tyco") - All Rights Reserved. Legal Disclaimer - Some of the individuals posting to this site, including the moderators, work for Tyco. Opinions expressed here and in any corresponding comments are the personal opinions of the original authors, not of Tyco. The content is provided for informational purposes only and is not meant to be an endorsement or representation by Tyco or any other party. Use of this website and all contributions are subject to Tyco’s Social Media Engagement Terms of Use and Privacy Policy. This site is available to the public. No information you consider confidential should be posted to this site. By posting you agree to be solely responsible for the content of all information you contribute, link to, or otherwise upload to the Website and release Tyco from any liability related to your use of the Website. You also grant to Tyco a worldwide, perpetual, irrevocable, royalty-free and fully-paid, transferable (including rights to sublicense) right to exercise all copyright, publicity, and moral rights with respect to any original content you provide. The comments are moderated. Comments will appear as soon as they are approved by the moderator.

Tyco Integrated Security