By 2022, 1.5 billion devices with cellular connections are expected to be scattered around the world

These devices which form the Internet of Things (IoT) coupled with the adoption of cloud services has the potential to create an even more complex cybersecurity landscape and businesses ought to be prepared.

Even today, as the Internet of Things grows, the attack vectors we face in 2019 are far more different than those we saw even five years ago.

What’s more is that according to specialist security sales executive at T-Systems, Lukas van der Merwe the threats a business faces are more sophisticated and more persistent.

“The development of IoT has seen the advent of a multitude of smart devices that are connected to the Internet, which traditionally ran on closed and secure Operational Technology (OT) networks. This can impact an organisation’s risk profile, as these devices are open to a number of new vulnerabilities,” explains van der Merwe.

“Ultimately, the implications of a cyberattack could range from shutting down a small manufacturing plant to affecting power distribution across half of the country,” he warns.

Despite the rise of these threats, the solution remains somewhat the same – a good IT and security team.

That having been said, the rapid adoption of new technologies coupled with the growing cyber threats means that IT and security teams are struggling to keep up with new developments.

“There is a multitude of platforms, developed by third parties, that are constantly changing and growing, based on consumer demand. These are deployed and adopted by the organisation at a pace that the internal security team cannot keep up with. So, your subject matter expert is no longer a subject matter expert in your environment, because your environment has become so much more complex,” explains deal solutions manager at T-Systems South Africa, Andre Schwan.

The manager says that businesses can no longer rely on one person or a small team to handle cyber threats.

Due to the nature of the landscape a team made up of individuals that are experts in specific fields that can address a multi-cloud, multi-device and IoT environment.

In lieu of this a firm can tap up a security service provider that can assist in this regard. Especially in respect of South Africa, cybersecurity skills may be in short supply so drawing on a provider’s services may be the best option.

“The right partner can provide R&D, broad experience and development across a client’s environments, bringing much deeper capability and security experience at a much lower cost than if the client did it themselves,” Schwan explains.

While a firm may be hesitant to look outside of its walls for help, the rising threats mean that any firm can become a target. Perhaps then it’s time to consider employing the service of a firm made up of cybersecurity experts rather than going at it alone.

[Image – CC 0 Pixabay]