Cyber Week Sale! 50% Off All Access

For Entrepreneurs Looking to Disrupt the Internet of Things Industry, Here is How to Ensure Customers Feel Safe Using Your Products For the full potential of the Internet and IoT devices to be realized, we must demonstrate both can be properly secured and that we can protect the privacy of those who use them.

By Gary Davis Edited by Dan Bova

Opinions expressed by Entrepreneur contributors are their own.

Shutterstock

Q: For entrepreneurs going into the Internet of Things, what do they need to worry about? How do they keep their product safe?

A: One of the biggest security challenges we will face over the next five years is how to secure the 50 billion devices coming online. Between the exponential growth of connected devices and the introduction of hyper-connectivity with 5G, the bad actors will have an unprecedented ability to leverage an extraordinarily large attack surface at previously unrealized speeds.

In the middle of 2014, HP published research that basically suggested that most IoT device manufacturers were foregoing any meaningful security and instead solving for time to market and convenience. In the report, they looked at the top 10 devices deployed in consumers' homes and found that they had on average 25 vulnerabilities each. Most of those vulnerabilities were things that any security practitioner would address before taking the device to market such as not using encrypted communications, not requiring a password reset and not requiring a complex password, to name a few. I recall being on a panel at IoT conference last year where one of the panelists talked about a connected lightbulb that was broadcasting WiFi passwords in clear text so anyone who detected the lightbulb would be able to easily tunnel into any device connected to the WiFi.

Related: What Small Businesses Need to Know About the Future of Cybersecurity and Hackers

To build trust with the businesses and consumers who will be purchasing your IoT devices, I suggest you consider the following:

Build security in from the beginning.

Hire a cybersecurity expert or seek consultation to ensure you are building products that are secure before you take them to market. Your worst nightmare would be waking up one morning to find your IoT devices were shown to be easily hacked or have a serious exploitable vulnerability.

Take privacy seriously.

Don't bury the privacy statement deep in a EULA and be sure to use simple language that clearly reflects what information you will collecting and what you will be doing with the data.

Related: Going Beyond Passwords: 4 Ways to Keep Your Company's Information Safe

Be transparent.

Only collect the data you need what you say you're going to collect and only do with it what you say in your privacy statement.

Plan for the worst.

Even if you have built a secure IoT device and are adhering to your privacy statement, you still may find your device and company being the victim of an attack. You should build and practice a crisis communications plan should your company's IoT device be a negative media headline.

Stay informed.

Security practices, architectures and solutions are constantly evolving especially as they relate to IoT. Stay informed of what's going on the space and use the latest, best known methods and techniques.

Research was recently published saying that 45 percent of those surveyed said concerns over online privacy and security stopped them from using the Internet in very practical ways. I believe for the full potential of the Internet and IoT devices to be realized, we must demonstrate both can be properly secured and that we can protect the privacy of those who use them.

Related: Digital Pickpockets Are Now Targeting Your Smartphone
Gary Davis

Chief Consumer Security Evangelist at Intel

Gary Davis is Intel's chief consumer security evangelist. He works closely to drive strategic alignment of products with the needs of the security space, as well as overseeing Intel Security online safety education to educate businesses and consumers by distilling complex security topics into easily understandable and actionable advice. During his more than five years at Intel Security, he has held leadership roles in the consumer and enterprise divisions where he has helped shape various product portfolios and strategic direction along with advocating for cybersecurity education.

Want to be an Entrepreneur Leadership Network contributor? Apply now to join.

Business News

'Brazen, Targeted Attack': UnitedHealthcare CEO Fatally Shot Outside Hotel in Manhattan

Brian Thompson was killed in what the NYPD says was a targeted attack.

Business News

Hackers May Be Reading Your Texts — U.S. Officials Urge All Americans to Use Encryption Messaging Apps in the Wake of Massive Cyberattack

The FBI and security officials warn that messages sent by AT&T, Verizon, and Lumen Technologies customers are vulnerable.

Science & Technology

Seven Years Ago, He Decided to Stop Doing the Expected and Went for a 'Moonshot.' This Year, His Company Will Make Just Under Billion Dollars in Revenue.

Brandon Sawalich, President and CEO of Starkey, discusses his company's revolutionary implementation of AI into hearing aid technology.

Business News

Mark Zuckerberg Wants to 'Play an Active Role' Shaping Tech Policies in Donald Trump's New Administration, According to a Meta Executive

Zuckerberg and Trump are reportedly taking tech ahead of the president-elect's inauguration.