{"id":10991,"date":"2017-02-28T14:46:09","date_gmt":"2017-02-28T19:46:09","guid":{"rendered":"http:\/\/www.iri.com\/blog\/?p=10991"},"modified":"2017-11-03T14:17:37","modified_gmt":"2017-11-03T18:17:37","slug":"the-formidable-but-imperative-task-of-iot-security","status":"publish","type":"post","link":"https:\/\/beta.iri.com\/blog\/data-protection\/the-formidable-but-imperative-task-of-iot-security\/","title":{"rendered":"The Formidable but Imperative Task of IoT Security"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">The Internet of Things (<\/span><a href=\"https:\/\/en.wikipedia.org\/wiki\/Internet_of_things\"><span style=\"font-weight: 400;\">IoT<\/span><\/a><span style=\"font-weight: 400;\">) continues to grow at an unbelievable rate, and creates tremendous benefits and opportunities for society. With it grows the demand for products and services that control, manage, and protect the massive amounts of data streaming from all those network-connected devices. \u00a0But as they provide more and more advantages, and even become essential to our daily lives, security has not managed to keep pace with the vicissitudes of the rapid development taking place. \u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This article discusses some of the substantial economic and safety risks, challenges and vulnerabilities, as well as strategic principles and practices to consider when endeavoring to secure your IoT operation or application.<\/span><\/p>\n<p><a href=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2017\/02\/02-Network-Traffic.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-10993\" src=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2017\/02\/02-Network-Traffic.png\" width=\"600\" height=\"399\" srcset=\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2017\/02\/02-Network-Traffic.png 778w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2017\/02\/02-Network-Traffic-300x200.png 300w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2017\/02\/02-Network-Traffic-768x511.png 768w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/a><b><\/b><\/p>\n<h3><b>Associated Risks<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">It is no secret that the ubiquity of IoT has led to the increasing prevalence of cybercrime. Data is being stolen at an alarming rate while it is being generated, gathered, and analyzed. \u00a0<\/span><a href=\"https:\/\/vigilante.pw\/\"><span style=\"font-weight: 400;\">Vigilante.pw<\/span><\/a><span style=\"font-weight: 400;\">, a prominent, non-profit website continually logging data breaches and compromised databases, shows in real time just how frequent this problem is. \u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Data breaches often include payment card information (PCI), personally identifiable information (PII), sensitive personal information (SPI), and protected health information (PHI), which are among the most valuable commodities for sale on the black market.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cRight now there\u2019s a much bigger database leaking\/trading scene than ever before,\u201d according to Keen, the pseudo-named owner of Vigilante.pw. \u00a0\u201cThere are a lot of different people playing in this scene. \u00a0I don\u2019t think anything is getting better, that much is pretty clear, (and) there&#8217;s a lot of stuff out there that we don&#8217;t even know about.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In addition to privacy concerns, there are physical risks, too, with IoT connected devices and the information they produce. Concern is escalating over those utilizing them for crimes like impersonation and cyber-theft, and for sowing discord. Harassment and stalking, break-ins, fraudulent transactions, vandalism, and burglary are also possible.<\/span><\/p>\n<p><b>\f<a href=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2017\/02\/03-IoT-Authorization.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-10994\" src=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2017\/02\/03-IoT-Authorization.png\" alt=\"IoT Authorization\" width=\"600\" height=\"402\" srcset=\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2017\/02\/03-IoT-Authorization.png 773w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2017\/02\/03-IoT-Authorization-300x201.png 300w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2017\/02\/03-IoT-Authorization-768x515.png 768w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/a><\/b><\/p>\n<h3><b>Challenges and Vulnerabilities<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Unauthorized access that makes data, property, and lives vulnerable must be avoided, especially in mission-critical environments like banking and healthcare. IoT is mostly dependent on cloud and mobile services for information exchange between applications and their devices. Thus, sufficient measures to configure the security of these interfaces are paramount in making sure data is transferred, processed, and stored safely. \u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The majority of IoT devices transmit data via a Web Interface, and many of those transmissions have security holes. Allowing plaintext login credentials, and not requiring strong passwords or disabling access after a certain number of failed login attempts can all lead to lost data and control of the IoT device.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Data can also be intercepted if network communications are unencrypted, or transmitted through insecure protocols. \u00a0More stringent regulations are necessary to prevent data loss and manipulation. Otherwise, IoT devices may be compromised and used in deviant ways, or rendered unusable.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Regular firmware or software updates may then be necessary once all interfaces are secure. \u00a0Integrity verification and systems with strong authentication\/authorization procedures may be difficult and expensive to implement. However, the risks and results of not doing so may be much costlier!<\/span><\/p>\n<p><a href=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2017\/02\/04-Cloud-Interface.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-10995\" src=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2017\/02\/04-Cloud-Interface.jpg\" alt=\"Cloud Interface\" width=\"591\" height=\"335\" srcset=\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2017\/02\/04-Cloud-Interface.jpg 591w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2017\/02\/04-Cloud-Interface-300x170.jpg 300w\" sizes=\"(max-width: 591px) 100vw, 591px\" \/><\/a><\/p>\n<p><span style=\"font-weight: 400;\">Physical security is also necessary for many IoT devices. Businesses should mandate strict monitoring and control over the physical access to their devices to safeguard the data used for analytics, application integration, and other purposes. Like cloud\u00a0and mobile interfaces, the consequences of neglecting physical security can end up being dire.<\/span><b><br \/>\n<\/b><\/p>\n<h3><b>IoT Security Principles and Practices<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Implementing security beyond the basics &#8212; which some IoT devices don\u2019t even have &#8212; can help mitigate the kinds of risks and vulnerabilities above. The U.S. Department of Homeland Security recommends the following six principles, along with suggested practices to address IoT security challenges:<span id='easy-footnote-1-10991' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/beta.iri.com\/blog\/data-protection\/the-formidable-but-imperative-task-of-iot-security\/#easy-footnote-bottom-1-10991' title='&lt;a href=&quot;https:\/\/www.dhs.gov\/sites\/default\/files\/publications\/Strategic_Principles_for_Securing_the_Internet_of_Things-2016-1115-FINAL_v2-dg11.pdf&quot;&gt;Strategic Principles for Securing the Internet of Things (IoT), Version 1.0&lt;\/a&gt; &amp;#8211; DHS Release, November 15, 2016'><sup>1<\/sup><\/a><\/span><\/span><\/p>\n<div style=\"font-family: courier, sans-serif;\">\n<ul>\n<li><b>Incorporate Security at the Design Phase.<\/b><\/li>\n<\/ul>\n<ol>\n<ol>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Enable security by default through unique, hard to crack default usernames and passwords. <\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Build the device using the most recent operating system that is technically viable and economically feasible.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\"> Use hardware that incorporates security features to strengthen the protection and integrity of the device.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Design with system and operational disruption in mind. \u00a0Where feasible, developers should build IoT devices to fail safely and securely, so that the failure does not lead to greater systemic disruption. <\/span><\/li>\n<\/ol>\n<\/ol>\n<\/ol>\n<ul>\n<li><b>Promote Security Updates and Vulnerability Management.<\/b><\/li>\n<\/ul>\n<ol>\n<ol>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Consider ways in which to secure the device over network connections or through automated means. <\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Consider coordinating software updates among third-party vendors to address vulnerabilities and security improvements to ensure consumer devices have the complete set of current protections.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Develop automated mechanisms for addressing vulnerabilities.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Develop a policy regarding the coordinated disclosure of vulnerabilities, including associated security practices to address identified vulnerabilities.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Develop an end-of-life strategy for IoT products.<\/span><\/li>\n<\/ol>\n<\/ol>\n<\/ol>\n<ul>\n<li><b>Build on Recognized Security Practices.<\/b><\/li>\n<\/ul>\n<ol>\n<ol>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Start with basic software security and cybersecurity practices and apply them to the IoT ecosystem in flexible, adaptive, and innovative ways. <\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Refer to relevant Sector-Specific Guidance, where it exists, as a starting point from which to consider security practices. <\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Practice defense in depth. Developers and manufacturers should employ a holistic approach to security that includes layered defenses against cybersecurity threats, including user-level tools as potential entry points for malicious actors.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Participate in information sharing platforms to report vulnerabilities and receive timely and critical information about current cyber threats and vulnerabilities from public and private partners.<\/span><\/li>\n<\/ol>\n<\/ol>\n<\/ol>\n<ul>\n<li><b>Prioritize Security Measures According to Potential Impact.<\/b><\/li>\n<\/ul>\n<ol>\n<ol>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Know a device\u2019s intended use and environment, where possible.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Perform a \u201cred-teaming\u201d exercise, where developers actively try to bypass the security measures needed at the application, network, data, or physical layers.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Identify and authenticate the devices connected to the network, especially for industrial consumers and business networks.<\/span><\/li>\n<\/ol>\n<\/ol>\n<\/ol>\n<ul>\n<li><b>Promote Transparency across IoT.<\/b><\/li>\n<\/ul>\n<ol>\n<ol>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Conduct end-to-end risk assessments that account for both internal and third party vendor risks, where possible. <\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Consider creating a publicly disclosed mechanism for using vulnerability reports. <\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Consider developing and employing a software bill of materials that can be used as a means of building shared trust among vendors and manufacturers.<\/span><\/li>\n<\/ol>\n<\/ol>\n<\/ol>\n<ul>\n<li><b>Connect Carefully and Deliberately.<\/b><\/li>\n<\/ul>\n<ol>\n<ol>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Advise IoT consumers on the intended purpose of any network connections.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Make intentional connections. \u00a0There are instances when it is in the consumer\u2019s interest not to connect directly to the Internet, but instead to a local network that can aggregate and evaluate any critical information.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Build in controls to allow manufacturers, service providers, and consumers to disable network connections or specific ports when needed or desired to enable selective connectivity.<br \/>\n<\/span><\/li>\n<\/ol>\n<\/ol>\n<\/ol>\n<\/div>\n<h3><b>IRI\u2019s Data-Centric Security Contributions<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">IRI is a data management and protection ISV whose <\/span><a href=\"http:\/\/www.iri.com\/products\/iri-data-protector\"><span style=\"font-weight: 400;\">tools<\/span><\/a><span style=\"font-weight: 400;\"> secure data at the field level in <\/span><a href=\"http:\/\/www.iri.com\/solutions\/big-data\/iot\"><span style=\"font-weight: 400;\">IoT devices and hubs<\/span><\/a><span style=\"font-weight: 400;\">, mainly by masking it at rest in log <\/span><a href=\"https:\/\/www.iri.com\/products\/workbench\/data-sources\"><span style=\"font-weight: 400;\">files or databases<\/span><\/a><span style=\"font-weight: 400;\">, or in MQTT and other streams.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">One example of an IRI data-centric security function is field-level encryption, which can also be <\/span><a href=\"http:\/\/www.iri.com\/solutions\/data-masking\/encryption\/format-preserving-encryption\"><span style=\"font-weight: 400;\">format-preserving encryption<\/span><\/a><span style=\"font-weight: 400;\"> (FPE). FPE is a best practice in IoT because it allows you to mask and transfer data securely, while maintaining its original format and storage space. Encrypting data values at the field level can stem the losses from device or communication breaches because the data involved was <\/span><a href=\"https:\/\/www.iri.com\/blog\/data-protection\/beyond-the-breach\/\"><span style=\"font-weight: 400;\">already protected<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<h3><b>Conclusion<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">With 50 billion IoT devices predicted to be in use by 2020, it really is at the intersection of big data gathering and communication. The storage, dissemination, and use of that data represent tradeoffs between risks and rewards, so we must strive to protect what\u2019s sensitive in that data. IoT security is not only a means to an end, it\u2019s a necessity to ensure the continued growth and development of free enterprise and information technology. The lifestyles to which we have become accustomed will depend on it.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Internet of Things (IoT) continues to grow at an unbelievable rate, and creates tremendous benefits and opportunities for society. With it grows the demand for products and services that control, manage, and protect the massive amounts of data streaming from all those network-connected devices. \u00a0But as they provide more and more advantages, and even<\/p>\n<div><a class=\"btn-filled btn\" href=\"https:\/\/beta.iri.com\/blog\/data-protection\/the-formidable-but-imperative-task-of-iot-security\/\" title=\"The Formidable but Imperative Task of IoT Security\">Read More<\/a><\/div>\n","protected":false},"author":101,"featured_media":10993,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[108,8,34],"tags":[1257,1256,98,97,1167,1079,1253,399,148,412,149,604,299,1254,1255],"class_list":["post-10991","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-big-data-2","category-data-protection","category-business","tag-cyber-crime","tag-cyber-theft","tag-format-preserving-encryption","tag-fpe","tag-internet-of-things","tag-iot","tag-payment-card-information","tag-pci","tag-personally-identifiable-information","tag-phi","tag-pii","tag-protected-health-information","tag-security","tag-sensitive-personal-information","tag-spi"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Formidable but Imperative Task of IoT Security - IRI<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/beta.iri.com\/blog\/data-protection\/the-formidable-but-imperative-task-of-iot-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Formidable but Imperative Task of IoT Security - IRI\" \/>\n<meta property=\"og:description\" content=\"The Internet of Things (IoT) continues to grow at an unbelievable rate, and creates tremendous benefits and opportunities for society. With it grows the demand for products and services that control, manage, and protect the massive amounts of data streaming from all those network-connected devices. \u00a0But as they provide more and more advantages, and evenRead More\" \/>\n<meta property=\"og:url\" content=\"https:\/\/beta.iri.com\/blog\/data-protection\/the-formidable-but-imperative-task-of-iot-security\/\" \/>\n<meta property=\"og:site_name\" content=\"IRI\" \/>\n<meta property=\"article:published_time\" content=\"2017-02-28T19:46:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-11-03T18:17:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2017\/02\/02-Network-Traffic.png\" \/>\n\t<meta property=\"og:image:width\" content=\"778\" \/>\n\t<meta property=\"og:image:height\" content=\"518\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Donna Davis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Donna Davis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/the-formidable-but-imperative-task-of-iot-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/the-formidable-but-imperative-task-of-iot-security\/\"},\"author\":{\"name\":\"Donna Davis\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/52271b71b77d927ce9421530e2b1260b\"},\"headline\":\"The Formidable but Imperative Task of IoT Security\",\"datePublished\":\"2017-02-28T19:46:09+00:00\",\"dateModified\":\"2017-11-03T18:17:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/the-formidable-but-imperative-task-of-iot-security\/\"},\"wordCount\":1271,\"commentCount\":3,\"publisher\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/the-formidable-but-imperative-task-of-iot-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2017\/02\/02-Network-Traffic.png\",\"keywords\":[\"cyber crime\",\"cyber-theft\",\"format-preserving encryption\",\"FPE\",\"Internet of Things\",\"IoT\",\"payment card information\",\"PCI\",\"personally identifiable information\",\"PHI\",\"PII\",\"protected health information\",\"security\",\"sensitive personal information\",\"SPI\"],\"articleSection\":[\"Big Data\",\"Data Masking\/Protection\",\"IRI Business\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/beta.iri.com\/blog\/data-protection\/the-formidable-but-imperative-task-of-iot-security\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/the-formidable-but-imperative-task-of-iot-security\/\",\"url\":\"https:\/\/beta.iri.com\/blog\/data-protection\/the-formidable-but-imperative-task-of-iot-security\/\",\"name\":\"The Formidable but Imperative Task of IoT Security - IRI\",\"isPartOf\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/the-formidable-but-imperative-task-of-iot-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/the-formidable-but-imperative-task-of-iot-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2017\/02\/02-Network-Traffic.png\",\"datePublished\":\"2017-02-28T19:46:09+00:00\",\"dateModified\":\"2017-11-03T18:17:37+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/the-formidable-but-imperative-task-of-iot-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/beta.iri.com\/blog\/data-protection\/the-formidable-but-imperative-task-of-iot-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/the-formidable-but-imperative-task-of-iot-security\/#primaryimage\",\"url\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2017\/02\/02-Network-Traffic.png\",\"contentUrl\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2017\/02\/02-Network-Traffic.png\",\"width\":778,\"height\":518},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/the-formidable-but-imperative-task-of-iot-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/beta.iri.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Formidable but Imperative Task of IoT Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#website\",\"url\":\"https:\/\/beta.iri.com\/blog\/\",\"name\":\"IRI\",\"description\":\"Total Data Management Blog\",\"publisher\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/beta.iri.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#organization\",\"name\":\"IRI\",\"url\":\"https:\/\/beta.iri.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"contentUrl\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"width\":750,\"height\":206,\"caption\":\"IRI\"},\"image\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/52271b71b77d927ce9421530e2b1260b\",\"name\":\"Donna Davis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f109ab98ab74af3d4419d9d477bb85db?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f109ab98ab74af3d4419d9d477bb85db?s=96&d=blank&r=g\",\"caption\":\"Donna Davis\"},\"url\":\"https:\/\/beta.iri.com\/blog\/author\/donnad\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Formidable but Imperative Task of IoT Security - IRI","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/beta.iri.com\/blog\/data-protection\/the-formidable-but-imperative-task-of-iot-security\/","og_locale":"en_US","og_type":"article","og_title":"The Formidable but Imperative Task of IoT Security - IRI","og_description":"The Internet of Things (IoT) continues to grow at an unbelievable rate, and creates tremendous benefits and opportunities for society. With it grows the demand for products and services that control, manage, and protect the massive amounts of data streaming from all those network-connected devices. \u00a0But as they provide more and more advantages, and evenRead More","og_url":"https:\/\/beta.iri.com\/blog\/data-protection\/the-formidable-but-imperative-task-of-iot-security\/","og_site_name":"IRI","article_published_time":"2017-02-28T19:46:09+00:00","article_modified_time":"2017-11-03T18:17:37+00:00","og_image":[{"width":778,"height":518,"url":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2017\/02\/02-Network-Traffic.png","type":"image\/png"}],"author":"Donna Davis","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Donna Davis","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/beta.iri.com\/blog\/data-protection\/the-formidable-but-imperative-task-of-iot-security\/#article","isPartOf":{"@id":"https:\/\/beta.iri.com\/blog\/data-protection\/the-formidable-but-imperative-task-of-iot-security\/"},"author":{"name":"Donna Davis","@id":"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/52271b71b77d927ce9421530e2b1260b"},"headline":"The Formidable but Imperative Task of IoT Security","datePublished":"2017-02-28T19:46:09+00:00","dateModified":"2017-11-03T18:17:37+00:00","mainEntityOfPage":{"@id":"https:\/\/beta.iri.com\/blog\/data-protection\/the-formidable-but-imperative-task-of-iot-security\/"},"wordCount":1271,"commentCount":3,"publisher":{"@id":"https:\/\/beta.iri.com\/blog\/#organization"},"image":{"@id":"https:\/\/beta.iri.com\/blog\/data-protection\/the-formidable-but-imperative-task-of-iot-security\/#primaryimage"},"thumbnailUrl":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2017\/02\/02-Network-Traffic.png","keywords":["cyber crime","cyber-theft","format-preserving encryption","FPE","Internet of Things","IoT","payment card information","PCI","personally identifiable information","PHI","PII","protected health information","security","sensitive personal information","SPI"],"articleSection":["Big Data","Data Masking\/Protection","IRI Business"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/beta.iri.com\/blog\/data-protection\/the-formidable-but-imperative-task-of-iot-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/beta.iri.com\/blog\/data-protection\/the-formidable-but-imperative-task-of-iot-security\/","url":"https:\/\/beta.iri.com\/blog\/data-protection\/the-formidable-but-imperative-task-of-iot-security\/","name":"The Formidable but Imperative Task of IoT Security - IRI","isPartOf":{"@id":"https:\/\/beta.iri.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/beta.iri.com\/blog\/data-protection\/the-formidable-but-imperative-task-of-iot-security\/#primaryimage"},"image":{"@id":"https:\/\/beta.iri.com\/blog\/data-protection\/the-formidable-but-imperative-task-of-iot-security\/#primaryimage"},"thumbnailUrl":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2017\/02\/02-Network-Traffic.png","datePublished":"2017-02-28T19:46:09+00:00","dateModified":"2017-11-03T18:17:37+00:00","breadcrumb":{"@id":"https:\/\/beta.iri.com\/blog\/data-protection\/the-formidable-but-imperative-task-of-iot-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/beta.iri.com\/blog\/data-protection\/the-formidable-but-imperative-task-of-iot-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/beta.iri.com\/blog\/data-protection\/the-formidable-but-imperative-task-of-iot-security\/#primaryimage","url":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2017\/02\/02-Network-Traffic.png","contentUrl":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2017\/02\/02-Network-Traffic.png","width":778,"height":518},{"@type":"BreadcrumbList","@id":"https:\/\/beta.iri.com\/blog\/data-protection\/the-formidable-but-imperative-task-of-iot-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/beta.iri.com\/blog\/"},{"@type":"ListItem","position":2,"name":"The Formidable but Imperative Task of IoT Security"}]},{"@type":"WebSite","@id":"https:\/\/beta.iri.com\/blog\/#website","url":"https:\/\/beta.iri.com\/blog\/","name":"IRI","description":"Total Data Management Blog","publisher":{"@id":"https:\/\/beta.iri.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/beta.iri.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/beta.iri.com\/blog\/#organization","name":"IRI","url":"https:\/\/beta.iri.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/beta.iri.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","contentUrl":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","width":750,"height":206,"caption":"IRI"},"image":{"@id":"https:\/\/beta.iri.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/52271b71b77d927ce9421530e2b1260b","name":"Donna Davis","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f109ab98ab74af3d4419d9d477bb85db?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f109ab98ab74af3d4419d9d477bb85db?s=96&d=blank&r=g","caption":"Donna Davis"},"url":"https:\/\/beta.iri.com\/blog\/author\/donnad\/"}]}},"jetpack_featured_media_url":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2017\/02\/02-Network-Traffic.png","_links":{"self":[{"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/posts\/10991"}],"collection":[{"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/users\/101"}],"replies":[{"embeddable":true,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/comments?post=10991"}],"version-history":[{"count":17,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/posts\/10991\/revisions"}],"predecessor-version":[{"id":11051,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/posts\/10991\/revisions\/11051"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/media\/10993"}],"wp:attachment":[{"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/media?parent=10991"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/categories?post=10991"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/tags?post=10991"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}