The Internet of Things (IoT) refers to the ever-growing network of physical
objects that are connected to the Internet.
1999
The Internet
of Things term
is coined
Jun 2000
WORLD
POPULATION
LG announces
it’s first Internet
refrigerator plans
Sep 2006
WiFi enabled
toy rabbit called
“Nabaztag” is
manufactured
2008 - 09
More Things
connected
than people
IoT is “Born”
Ericsson
predicts more than
50B connected
devices by 2020
Jun 2011
IPv6 Launch:
Virtually unlimited IP
address for internet
connected devices
Oct 2011
Jan 2014
Google Acquires
Nest Labs for $3.2B
Aug 2014
HP Security
researchers find
about 25 security
vulnerabilities per
IoT device
Apr 2015
7.2
2015
CONNECTED
DEVICES
50
6.58
BILLION
(PER PERSON)
BILLION
BILLION
25
3.47
6.8
12.5
BILLION
1.84
6.3
500
MILLION
.08
BILLION
2003
CONNECTED
DEVICES
BILLION
TECHNOLOGY
DISRUPTION
IoT devices are built quickly to
get first to market, and are made
for convenience rather
than security.
42%
perceived downsides
38%
comes with many
32%
25%
25%
Job Losses
Due to
Outsourcing
or Automation
Greater Price
Transparency
Lower Profit
Margins
28%
Nest Labs
introduces
Nest Learning
Thermostat
Nov 2013
2014 will be the
“Year of the
Internet of Things”
BILLION
May 2010
Nov 2011
Bug allows HP
printers to be
remotely hacked
and set on fire
7.6
2020
2010
Nest Labs founded
by former Apple
engineers
Feb 2010
50B
number of connected
objects expected by 2020
Jan 2014
100,000 IoT
devices had
already been
hacked
Inability of Our
IT Systems to
Keep Up
With Change
Regulatory
Challenges
Competetion
From New Rivals
SECURITY & PRIVACY
is the biggest concern for serious vulnerabilities
May 2014
Google Glass
goes on sale
for $1,500
Threats to Data
or Physical
Security
Security Flaws of Top 10 IoT Devices
Insecure Software & Firmware
Insecure Web Interface
Lack of Transport Encryption
Insufficient Authentication
May 2015
IBM reveals plans
to invest $3B in
IoT division
Raised Privacy Concerns
Failed to Protect Against Hackers
Discovering User Identity
Failed to Require Passwords
Vulnerable to XSS & Weak Credentials
The Apple Watch
is released
TM
Use Unencrypted Network Services
Collect Information
Predictions for Cybersecurity as
Internet of Things Adoption Grows
More Hackers will
Target Cloud Data
collected by IoT devices
Employees will be
companies’ biggest
threat
HOW TO
PROTECT YOUR
BUSINESS
AGAINST HACKERS
IN AN
IoT WORLD
Cyber attacks will
increase via data accessed
from third-party vendors
The potential cost
of breaches will
increase significantly
• Have a written and enforced BYOD policy
• Require employees to use strong, unique
passwords for all password protected IoT devices
• Monitor employee connected device usage
• Use multi-factor authentication when possible
• Use privileged access control
• Consider due diligence for any third-party IoT provider
• Use an enterprise password manager