• About
  • Subscribe
  • Contact
Thursday, May 8, 2025
    Login
FutureIOT
  • Technology
    • Sensors and Instrumentation
    • Devices
    • Cloud and Platforms
    • Research and Development
    • Governance, Standards and Regulations
    • Application and Middleware
    • Security
    • Big Data and Analytics
    • AI and Machine Learning
  • Industry
    • Manufacturing
    • Transportation and Logistics
    • Retail and E-commerce
    • Banking and Financial Services
    • Government, Healthcare and Education
    • Industrial
  • Application
    • Smart Cities
    • Future Workplace
    • Commercial
    • Smart Home
    • Customer Engagement
  • Resources
  • Podchats
  • Videos
  • Events
No Result
View All Result
  • Technology
    • Sensors and Instrumentation
    • Devices
    • Cloud and Platforms
    • Research and Development
    • Governance, Standards and Regulations
    • Application and Middleware
    • Security
    • Big Data and Analytics
    • AI and Machine Learning
  • Industry
    • Manufacturing
    • Transportation and Logistics
    • Retail and E-commerce
    • Banking and Financial Services
    • Government, Healthcare and Education
    • Industrial
  • Application
    • Smart Cities
    • Future Workplace
    • Commercial
    • Smart Home
    • Customer Engagement
  • Resources
  • Podchats
  • Videos
  • Events
No Result
View All Result
FutureIOT
No Result
View All Result
Home Technology Devices

Securing the smart devices across APAC’s cloud platforms

Alex Nehmy by Alex Nehmy
August 19, 2022
Photo by Amed Yousif from Pexels: https://www.pexels.com/photo/a-black-car-stereo-connected-to-the-aux-8677007/

Photo by Amed Yousif from Pexels: https://www.pexels.com/photo/a-black-car-stereo-connected-to-the-aux-8677007/

Enter 2022 and the ‘everything connected’ concept has all but taken centre stage. From treadmills, and lightbulbs to pet feeders and more, interoperability and interactivity between our everyday devices have become the new norm! At the same time, these non-commercial connected devices are creating more risk for the Enterprise than ever before.

To add to the magnitude of the problem, the Asia Pacific region’s expenditure on IoT is anticipated to grow, reaching US$437 billion by 2025. This signifies that governments and private organisations will continue to leverage IoT technologies at an accelerated pace, as the push for digitisation sustains momentum in the post-pandemic world.

Source: IDC

IoT technologies and devices are the backbones of any digital transformation process. They play a key role in driving automation, monitoring, and controlling the technology in smart buildings, ensuring a safe and seamless transition to a digitally enabled future.

However, many smart devices are not designed with security in mind or may have vulnerabilities from the source code used within the manufacturer's supply chain, of which users are unaware.

These security vulnerabilities combined with the rapid proliferation of IoT devices mean there’s an urgent need for organisations to think about the security of the devices on their networks.

As companies further invest in digital transformation, they need to pay an equal amount of attention to the security of the devices and technologies they use in their everyday operations.

So, what are the security concerns surrounding IoT devices, and what can we do about them?

Security limitations in IoT devices

Alarmingly, visibility into threats from IoT devices is often dependent on manually updated databases of known devices.

For instance, certain IoT devices do not have sufficient storage or processing power to support logging or cryptographic abilities that protect sensitive information from being processed, making them vulnerable. As a result, businesses cannot accurately identify and protect against the risk posed by unknown and unmanaged IoT devices.

In fact, such risks have increased with work-from-home arrangements. Our IoT Security Report 2021 found that 81% of respondents in Singapore who have IoT devices connected to their organisation’s network, saw an increase in non-business IoT devices on their corporate networks. Some of these devices include home devices, medical wearables and even game consoles. 

The hardware limitations to security controls in IoT devices, coupled with the rise of remote work, are some of the key factors causing regulators to turn their attention toward securing IoT devices across the region.   

Regulators set the tone

In response to the growth of IoT technologies in the Asia Pacific region, regulators have developed IoT security regulations and standards for organisations and users.

In Singapore, the government has been proactively addressing this need, through initiatives such as the Cybersecurity Labelling Scheme and the National Integrated Centre for Evaluation (NiCE) to protect consumers and businesses from malicious actors and to further research and be educated about IoT cybersecurity.

It has also established standards and published practical guidelines for IoT security (TR 64: 2018: “Guidelines for IoT security for smart nation” and Internet of Things (IoT) Cyber Security Guide). These guidelines are intended to serve as a blueprint for enterprise users and vendors to secure IoT devices.

Some of the key security measures outlined in the IoT Cyber Security guide include:

  • Enforcing proper access controls for IoT devices (Section 6.4.1)
  • Segmenting IoT and enterprise networks (Section 7.3.1)
  • Establishing proper device management (Section 7.4.1)
  • Conducting periodic vulnerability assessments on connected devices (Section 7.5.2)

Complying with local market regulations, on the Cloud

Digital transformation is fuelling IoT adoption in the Asia Pacific region and making organisations increasingly reliant on these devices for critical business operations.

At the same time, companies also must manage a growing set of local regulations on the usage and management of IoT devices and data. Government policies may dictate how data can be collected and retained and may even restrict the transfer of data across borders to prevent citizen data from being exploited.

It is common today to see businesses use a multitude of cloud services that host their data in different locations around the world. As such, regional companies that are reliant on cloud services to deliver services and enable remote work will find it challenging to comply with different local regulations.

Instead of using local servers to store data for every market, companies can use a cloud hosting solution in their market of choice to ensure that they can still take advantage of the cloud while staying compliant with local data regulations. Cloud hosting solutions that are built with security and regulatory best practices in mind will also allow businesses to meet both their data residency preferences while protecting their enterprise network. 

Businesses need to be proactive too

Photo by ThisIsEngineering: https://www.pexels.com/photo/person-holding-black-tablet-3912956/

Aside from complying with regulatory standards, organisations must take the necessary precaution to proactively secure their networks in this digital economy as well.

A prerequisite to effectively applying these security measures is visibility into and an understanding of the identity and behaviour of all network-connected devices.

A zero-trust approach to network-level IoT security - where enterprises have full visibility of IoT devices, practice continuous device and risk monitoring, and develop security policies with enforcement actions to prevent cyberattacks from happening - is needed to ensure organisations can better eliminate critical security blind spots.

Organisations can also take preventive measures a step further by deploying Machine Learning (ML) technologies to automate device identification, proactively detect malicious deviations, and automatically prevent attacks. As adversaries get more advanced, organisations can leverage ML capabilities to help them always stay vigilant.  

IoT security is everyone’s responsibility

Both governments and businesses play an integral role in maintaining IoT security. The ubiquity of IoT devices will only mean that the applications of such devices will continue to grow across all industries, and it is everyone’s responsibility to protect themselves and the organisation from cyber adversaries:

  • Regulators lay the groundwork for cybersecurity regulations and standards that can be applied at scale
  • A cloud hosting solution with built-in security controls helps organisations meet data residency preferences while enjoying the benefits of the cloud
  • Organisations need to proactively enforce a Zero Trust approach to eliminate IoT device blind spots and deploy ML technologies to automatically prevent attacks
Related:  Outlook: Cellular IoT connections to jump to 4.1B by end of 2024
Tags: Cybersecurity Labelling SchemeIoT Cyber Security GuidePalo Alto Networkssmart devices
Alex Nehmy

Alex Nehmy

Alex Nehmy is director of Industry 4.0 at Palo Alto Networks. He has specialised in cyber security for the past 20 years. He has consulted nationally and internationally for KPMG as well as led cyber security for Australia's largest defence prime. Nehmy built the cyber security capabilities for The University of Adelaide and also SA Power Networks, where he brought the IT and Operational Technology groups together to secure the South Australian electricity grid and watched the disruption from the green energy revolution play out with the huge growth of rooftop solar and initiatives such as the virtual power plant with Tesla. Nehmy brings a wealth of industry experience, especially in critical infrastructure, to Palo Alto Networks.

No Result
View All Result

Recent Posts

  • AI to fuel the rise of zero touch networks
  • Surge in ambient IoT to pave the way for sustainable tech
  • Imbibing AI skills into Singapore’s future workforce today
  • Asia Pacific's AI ambitions hinge on next-generation networks
  • Gartner urges supply chain leaders to adopt cost-to-serve model

Categories

  • Agriculture
  • AI and Machine Learning
  • Application
  • Application and Middleware
  • Automotive
  • Banking and Financial Services
  • Big Data and Analytics
  • Blockchain
  • Case Studies
  • Change Healthcare
  • CHRO
  • Cloud and Platforms
  • Commercial
  • Construction
  • Consumer
  • Customer Engagement
  • Devices
  • ESG
  • Future Workplace
  • FutureCOO
  • Governance, Standards and Regulations
  • Government, Healthcare and Education
  • Hospitality and Tourism
  • Industrial
  • Industry
  • IT-OT integration
  • Manufacturing
  • Networking
  • Operations
  • Research and Development
  • Retail and E-commerce
  • Security
  • Sensors and Instrumentation
  • Smart Cities
  • smart contracts
  • Smart Home
  • Start-ups
  • Supply chain
  • Technology
  • Telecommunications
  • TIBCO
  • Transportation and Logistics
  • Videos
  • Whitepapers

About FutureIoT

Asia’s ONLY dedicated IoT publication

The race to harness the power of Internet of Things (IoT) is here. FutureIoT is dedicated to individuals, as well as public and private organizations looking to tap the potential of IoT to transform the way we live, work and do business. FutureIoT is the dedicated media that provides the single source of truth about IoT, the technology, its application and regulation, originating from Asia. << Read more >>

Quick Links

  • Subscribe
  • Contact
  • Privacy Policy
  • Cookie Policy
  • Terms of Use

Categories

Recent News

Photo by Polina Tankilevitch: https://www.pexels.com/photo/hand-of-a-woman-showing-palm-with-a-word-no-4830656/

AI to fuel the rise of zero touch networks

May 8, 2025
Photo by John Tekeridis: https://www.pexels.com/photo/round-grey-speaker-on-brown-board-1072851/

Surge in ambient IoT to pave the way for sustainable tech

May 7, 2025
  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Technology
    • Sensors and Instrumentation
    • Devices
    • Cloud and Platforms
    • Research and Development
    • Governance, Standards and Regulations
    • Application and Middleware
    • Security
    • Big Data and Analytics
    • AI and Machine Learning
  • Industry
    • Manufacturing
    • Transportation and Logistics
    • Retail and E-commerce
    • Banking and Financial Services
    • Government, Healthcare and Education
    • Industrial
  • Application
    • Smart Cities
    • Future Workplace
    • Commercial
    • Smart Home
    • Customer Engagement
  • Resources
  • Podchats
  • Videos
  • Events
Login

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Subscribe