In our hyper-connected world, advancing technology in IoT is bringing promise to many systems across industry sectors.
The Internet of Medical Things or IoMT which is a subset of the Internet of Things is one of the many emerging technologies that has impacted the healthcare system and our lives.
Hospitals and medical centers depend on smart devices for doctors to monitor their patients and their medical situations quickly and efficiently. In addition, these devices offer more precise analysis and earlier recognition of medical issues with the help of information flow.
According to a report published by Deloitte, “Hospitals in the U.S. have an average of 15 smart medical devices per bed, while the IoMT market is expected to reach $52 billion by 2022.”
Security risks for smart devices
IoMT, like any other technological device, is also subject to security risks such as cyberattacks. Malicious activities have increased in number in the last few years targeting medical institutions and being the cause of major disruption in the healthcare system, financial losses, which has lowered patient’s confidence in healthcare.
For example, hackers disabled computer systems at Düsseldorf University Hospital in Germany last September and led to the death of a patient while doctors attempted to transfer her to another hospital. The ransomware attack scrambles data, making computer systems inoperable.
The hospital’s President Arne Schönbohm said hackers took advantage of a well-known vulnerability in a piece of VPN (virtual private network) software developed by Citrix and warned other organizations to protect themselves from the flaw.
The need to implement robust IoMT security solutions in the medical industry has never been more important. Encryptions and conducting a secure boot – making sure that when a device is turned on, none of its conﬁgurations have been modiﬁed – are some of the basic yet fundamental security measures providers and manufacturers of IoT devices can take.
Other important security measures:
- A defense strategy should be put in place and implemented with multiple layers of security available to protect against any risk. Make sure that authentication is properly followed, device access is limited, and device-to-device communication is monitored carefully.
- The IoT device should be tested before it is put into production. Monitoring device security should be done throughout its life cycle to ensure fewer vulnerabilities. After the machine has been produced, security measures should be incorporated into its design such as conducting a risk assessment before the device is released for use in the market. Authentication measures should be built into the device.
- Create an environment for teaching the culture of security, where the IT department can inform employees about issues and their dangers on the system or company they work for. In addition, conducting regular trainings to recognize vulnerabilities, cyber threats, risks and anomalies will speed up breach response.
Cyberattacks will never simply vanish. No matter the level of precautions we take, there will always be a degree of risk but making sure devices are secure and teams are vigilant and prepared, may help reduce overall disruption caused by cybercrime.
Telenor unifies its IoT services portfolio
Norwegian telecoms provider Telenor Group announced late last week that it will be unifying its Internet of Things (IoT) services across the Nordic region and internationally, placing them under one large portfolio.
“Effective immediately, Telenor IoT will be offered from all Telenor business channels in the Nordics, and internationally by Telenor Connexion and through selected partners,” the provider said in a statement.
As a part of introducing Telenor IoT, a new operating model is being launched to leverage on Telenor’s global competency, synchronize product development, accelerate the customer facing business and improve technical support.
“In doing so, Telenor is bringing together 200 full time IoT specialists, the largest team for any Nordic IoT service provider,” the telco said. It also highlighted that the company would act as one united global IoT team with a uniform product portfolio and go-to-market strategy – bringing the best capabilities and competence to every customer.
“The new operating model reinforces our competitive edge and makes our product portfolio easier to buy for any customer searching for world class IoT operation and platform capabilities. We are also getting scale benefits on new technology investments,” Commenting on the announcement, Mats Lundquist, CEO of Telenor Connexion and manager of Telenor IoT said in the statement.
The Telenor IoT offering will be supplied by Telenor IoT specialists located in 18 countries across Africa, the Americas, Asia-Pacific, and Europe.
“The launch of Telenor IoT and unifying our IoT capabilities and competencies will make us better positioned to accelerate the digital future that will benefit customers, businesses, and society. The steps we are taking now is the culmination of several months of intense collaboration between colleagues in Telenor’s Nordic telco businesses, Telenor Connexion, and Telenor’s Nordic Hub,” Jukka Leinonen, Nordic EVP and Chairman of the Telenor Connexion Board said.
Telenor is considered as a big player within the IoT services space with over 17 million connected devices active in more than 190 countries. In 2019, the provider was positioned as a leader in Gartner’s Magic Quadrant for Managed IoT Connectivity Services, Worldwide.
Today, Telenor ranks among the top 10 IoT operators globally, and in the top 3 in Europe by volume, and is the clear market leader in the Nordics.
E-scooters to benefit from Ericsson-Arkessa partnership
After using the internet to keep people connected for quite some time, many devices nowadays have the capability to be connected to each other by the internet of things technology (IoT) which can work directly through a smartphone.
From small devices to cars and houses, IoT is the main driver to create a new ecosystem by having objects engineered to seamlessly communicate with each other, and especially with the user, to support all day connectivity across the ecosystem.
According to Ericsson, the number of cellular IoT connections will grow from 1.7 billion in 2020 to 5.9 billion in 2026, while the manufacturing IoT managed services segment is estimated to hold approximately 27.5% of the market share in 2026, according to Persistentmarketresearch.
New partnership for IoT connectivity
As such, Ericsson (NASDAQ: ERIC) and Arkessa reached a deal to provide a secure, managed global connectivity solution that supports the rapid and efficient deployment of Voi e-scooter fleets around the world.
According to Ericsson, that partnership will help increase micro-mobility in cities by having global SIMs supplied by Arkessa, allowing Voi to easily provision, activate scooters and manage its fleet of connected scooters worldwide, regardless of their location.
Arkessa’s global connectivity offers Sweedish Voi the flexibility to deploy its growing fleet of e-scooters in various countries while minimizing costs and optimizing coverage.
One SIM can connect to different service providers without the need for physical replacements, offering significant cost savings in fleet management. Voi gains full global connectivity management benefits powered by Ericsson IoT Accelerator.
These IoT-enabled devices contain sensors that constantly collect and react to data, and this vast level of data can be used to unlock new levels of intelligence.
Fredrik Hjelm, CEO and co-founder of Voi, says, “We are excited to work with Arkessa to provide superior IoT connectivity in our scooters and ensure an even higher level of service for our riders and partner cities. By leveraging Arkessa’s secure and resilient global network connectivity, Voi can continue to deliver fast, reliable e-scooter services as we expand into new markets and roll out our next-generation vehicles and IoT hardware.”
Benefits of IoT scooters
In parallel, these scooters which are activated by the smartphone now ubiquitous in every country in Europe and the United States, giving citizens, tourists and locals an alternative and convenient option to move around the city.
On the other hand, the data is collected from the scooter directly via integrated sensors which are transmitted via cellular connectivity to the systems of the companies that own them.
Information – which includes the location of each connected bicycles and scooter, how long each ride takes, which docks need to be restocked, and which ones are full – is always available in real time.
For example, New York’s Citi Bike makes its system data publicly available and invites developers, engineers, and statisticians to use it for analysis, development, and visualization. These measures are taken for the purpose of making better decisions related to transportation and municipal infrastructures.
The idea is that the continuously streamed data collected from connected bikes and scooters will become a crucial components of a fully functional and responsive interconnected grid that can process big data .
Enterprises are increasingly taking advantage of cellular IoT to deliver new services, derive new revenue streams and improve operational cost-efficiency.
Tips to increase and maintain IoT smart home security
From the thermostat and television to lights, curtains, and security systems, the Internet of things (IoT) turns any home into one connected cell controlled by the single touch of its owner.
Once a home is transformed into a smart one, all connected devices can be controlled remotely through the Internet. However, as with every technology, it is subject to various cybersecurity risks.
According to a report by Statista, the global market revenue in Smart Home technology is forecasted to reach a value of US$77,386 million in 2020, and more than 141 billion U.S. dollars by 2023.
“A global comparison reveals that most revenue is generated in the United States (US$23,328m in 2020),” the report highlighted.
Ways to improve IoT security
Before purchasing any IoT device, users should primarily research the different devices available as well as their related security level to select the safer option in terms of security and privacy.
Thus, to benefit from the efficiency of these smart devices whilst shielding them from attacks, there are several measures that should be taken by the smart homeowners:
1- Update the software:
According to U.S.-based cybersecurity software developer Norton, software updates related to IoT devices should not be neglected and updated frequently when notified on their smartphones.
In parallel, users should manually follow up for software updates by regularly checking online for update availability and launch dates.
Taking a step backwards, homeowners should ensure the availability of security on IoT devices to begin with, since security isn’t on the manufacturers’ top priority list, as some devices are not designed with a mechanism for updating software, leading to vulnerabilities putting it under potential risk.
2- Use strong passwords:
The second most important security measure for IoT devices after software updates, according to an article published by Forbes Technology Council, is the use of the strongest authentication possible.
In other words, passwords are to be long, complex, and hard to guess.
“To gain control of a device, the hacker needs certain information from you. Many of these instances come when default passwords or simple phrases are used,” Richard Davis, Katalyst Data Management said.
Davis recommends using a password manager and a second-factor authentication app (rather than mobile phone SMS) to control access. These will deter the drive-by hacker by increasing the amount of work they have to put into hacking you.
3- Set up the router securely:
First off, changing the routers’ default name after purchase to a unique name that cannot be traced to the user’s home address is key to preventing unauthenticated access by cybercriminals.
Likewise, using complex and long passwords, including upper and lowercase letters as well as numbers, and special characters will help secure it even further. In addition, strong encryption protocols are highly recommended to protect Wi-fi access and network security.
The highest level of encryption is currently WPA2, which will be soon succeeded by WPA3.
“Home routers are primary IoT targets for hackers. Thus, a secure router translates to a substantially more secure smart home,” Travis Goodreau, a home Security & Safety Expert at SafeHome, was quoted as saying.
Each IoT device is to have a separate login credential so that if one device is hacked, the others remain unaffected. A password manager tool can be used to store the passwords for all the devices since there can be many passwords, one for each device, and easily forgotten users.
In parallel to that, a separate network is to be set up for IoT devices, granting sole access to the homeowner, to add an extra layer of security, whilst giving access to other networks for family, friends, and visitor use.
4- Install a next generation firewall:
The traditional firewall system may not be sufficient to secure IoT devices from cyberattacks, thus, the introduction of next generation firewall – which is an integrated platform that combines the traditional firewall with other functionalities such as virtual private network (VPN), malware protection and intrusion prevention system (IPS).
Although next generation firewalls are quite expensive, having the right security measures in place is worth their weight in gold.
The threat of cyberattacks on digital homes is on the rise, and the importance of safeguarding smart home security is increasing as consumers acquire more developed IoT devices, and become even more connected.
Mastercard, Geidea team up to bring contactless payments to Saudi Arabia
Unbound by geography, CFOs look to capitalize on global talent pool
United Airlines highlighting new emphasis on sustainable fuel along with global corporate partners
Japan’s Toshiba president steps down amid acquisition talks
NEOM: A $500 Billion smart-city to be built in Saudi Arabia
5 Reasons Why… Telecoms is Important in Society
Telecom Sales Strategies that will Bring You Success in 2020
Advantages and drawbacks of Voice Recognition Technology
- Interviews2 weeks ago
Raghid Charara, Vice President and Khaled Chatila, VP of Business Development at ANALITICO
- Community3 weeks ago
Women feel burnout from male bosses during pandemic, Girls in Tech study finds
- Telecoms2 weeks ago
eSIM’s silent revolution on track with 3.4 billion users by 2025, report finds
- Technology2 weeks ago
Big Tech’s outsized influence draws state-level pushback
- Technology3 weeks ago
Ingenuity Mars helicopter prepares for first historical flight
- Technology4 weeks ago
U.S. judge lifts CCMC ban on Xiaomi
- Technology4 weeks ago
Facebook launches vaccine finder tool, other features for vaccine awareness
- Fintech2 weeks ago
Would you like some Bitcoin with your Burrito?