Yes, oopsies. Making the headlines, data leaving the network. Whatever euphemism businesses chose, they are referring to the potential of being breached. That ongoing paranoia can be productive if it provokes dialogue and raises awareness.
In talking about the things that could go wrong, the moderator and editor in chief at The Security Ledger, Paul Roberts asked whether technology in devices should have an expiration date. Matwyshyn argued, “A limited expiration is not viable since vulnerabilities can be found by third parties on day one.”
Lefkowitz suggested that depending on the device functionality, data collection can be, “allow unless you prohibit or prohibit unless you allow.”
The conversations about data and privacy security in IoT are ongoing as are the number of detected vulnerabilities. Between the regulatory concerns and consumer confidence, businesses need to look at their established standards and rely on third-party audits and security researchers to protect themselves.
Sign up for Computerworld eNewsletters.