• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Home
  • About
  • Structure
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackey

The Internet of Things Is Going to Change Everything About Cybersecurity

December 19, 2017 by Sachin Shah Leave a Comment

https://hbr.org/2017/12/the-internet-of-things-is-going-to-change-everything-about-cybersecurity

Cybersecurity is such a volatile industry in so many aspects. In 2016, breaches cost businesses nearly $4 billion in 2017 the number will be roughly 6 billion. The constant number of threats and attacks is becoming so mainstream that businesses are investing more than $93 billion in cyber defenses by 2018. Congress is attempting to quickly to pass laws that will hope to improve the situation.

Despite increased spending and innovation in the cybersecurity market, there is every indication that the situation will only worsen. The number of unmanaged devices being introduced onto networks daily is increasing towards 20 billion in a few years. Attacks on Internet of Things (IOT) devices were up 280% in 2017. Traditional security solutions have not be effective in addressing these devices or in protecting them from hackers. Moving toward 2020 most attacks will be toward IOT devices.

The article explained that this IOT issue is changing the security game. Executives who are preparing to handle future cybersecurity challenges with the same mindset and tools that they’ve been using all along are setting themselves up for continued failure.

Filed Under: Week 14: Review of all topics Tagged With:

Reader Interactions

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (33)
  • Week 01: Overview (2)
  • Week 02: TCP/IP and Network Architecture (2)
  • Week 03: Reconnaisance (11)
  • Week 04: Vulnerability Scanning (14)
  • Week 05: System and User Enumeration (13)
  • Week 06: Sniffers (17)
  • Week 07: NetCat and HellCat (17)
  • Week 08: Social Engineering, Encoding and Encryption (21)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (17)
  • Week 11: SQL Injection (13)
  • Week 12: Web Services (18)
  • Week 13: Evasion Techniques (13)
  • Week 14: Review of all topics (11)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in