Cybersecurity Risks in the Internet of Things (and How to Solve Them)

| February 12, 2019

article image
The digital age has entirely reshaped how we create, enjoy, and share information around the world. If you find yourself needing to know almost anything, the answer is at your fingertips… but this has caused some new security concerns to arise too.The most obvious security concern on top of everyone’s mind is: bad passwords. Despite our awareness of using easy-to-hack passwords, the second most used password in 2018 was shockingly “password”,1 a fact made more frightening when you find out that over 3.3 billion records were stolen in the first half of 2018 (making clear just how vulnerable we all are).2 But it goes far deeper than that when you start investigating it. This is the trouble with the freedom of information and connection that the Internet of Things (IoT) has brought, because the IoT is reshaping the cybersecurity landscape.

Spotlight

PROLIM Corporation

PROLIM is a global company focused on product innovation by leveraging IT and PLM Technologies. PROLIM has more than a decade of PLM Service history – serving Automotive, Aerospace, High Tech and Industrial Machinery companies throughout the world. Our Product Lifecycle Management (PLM) practice is powered by a team of consultants who provide comprehensive end-to-end service offerings. We have a PLM Center-of-Excellence (CoE) that enables our customers to build innovative solutions to the most-pressing PLM challenges. The CoE is supported by the right skills, resources, technologies and methodologies and helps develop customized solutions to better manage the entire product lifecycle.

OTHER ARTICLES

New Ransomware Targets Critical Infrastructure in 2020

Article | March 31, 2020

Critical infrastructure, like power and water systems, face a number of cyber-security threats. Traditional ransomware variants can bring these systems down by encrypting files that are vital to their operation. However, a new variant poses an even greater risk to critical infrastructure. The Ekans ransomware is designed specifically to take down critical services, making anti-ransomware protection even more important in these environments. Ransomware is a well-known threat made famous by the WannaCry worm. The success of the 2017 WannaCry outbreak has inspired a rash of attacks and new ransomware variants in recent years.

Read More

How to Scale IT Infrastructure

Article | April 25, 2020

IT infrastructure scaling is when the size and power of an IT system are scaled to accommodate changes in storage and workflow demands. Infrastructure scaling can be horizontal or vertical. Vertical scaling, or scaling up, adds more processing power and memory to a system, giving it an immediate boost. Horizontal scaling, or scaling out, adds more servers to the cloud, easing the bottleneck in the long run, but also adding more complexity to the system.

Read More

Future-Proof Your IT: 4 Questions to Find the Right Strategy for You

Article | April 7, 2020

Cloud computing has completely changed the way we do business—and despite common misconceptions, the impact goes way beyond where files are stored. Sales teams can access customer relationship management (CRM) solutions from anywhere in the world, thanks to software as a service (SaaS). SaaS solutions also drive some of today’s most important customer interactions. At the same time, IT departments are under pressure to offer secure storage, lightning fast networking, and fast computing capabilities. There’s an increasing shift to “as a service” consumption models, and there’s a newer option to consider: “pay as you go.” Here’s what you need to consider as you navigate the evolving landscape of IT strategy.

Read More

Edge computing-driven transformation of data, management, and applications

Article | April 6, 2020

Big name companies are investing in edge computing developments. Bruce Davie, VMware’s VP and CTO, Asia Pacific and Japan, ranked Edge Computing along with the rise of mobile devices, cloud and AI in his list of “four super powers of technology”. According to Fujitsu CTO, Joseph Reger, “It is very obvious that you need to bring intelligence closer to [IoT] devices, and for that you must have a kind of distributed intelligence and that is going to reload the opportunities for digital transformation.” With reference to Gartner saying that by 2022, some 75% the of enterprise-generated data would be created and processed outside the traditional, centralised data centre or cloud, Hewlett Packard Enterprise (HPE) committed some US$4 billion investment in intelligent edge technologies and services by 2021.

Read More

Spotlight

PROLIM Corporation

PROLIM is a global company focused on product innovation by leveraging IT and PLM Technologies. PROLIM has more than a decade of PLM Service history – serving Automotive, Aerospace, High Tech and Industrial Machinery companies throughout the world. Our Product Lifecycle Management (PLM) practice is powered by a team of consultants who provide comprehensive end-to-end service offerings. We have a PLM Center-of-Excellence (CoE) that enables our customers to build innovative solutions to the most-pressing PLM challenges. The CoE is supported by the right skills, resources, technologies and methodologies and helps develop customized solutions to better manage the entire product lifecycle.

Events