• Home
  • News
  • Coins2Day 500
  • Tech
  • Finance
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
TechInternet of Things

Corporate IT isn’t ready for the Internet of things invasion

By
Stacey Higginbotham
Stacey Higginbotham
Down Arrow Button Icon
By
Stacey Higginbotham
Stacey Higginbotham
Down Arrow Button Icon
June 3, 2015, 1:19 PM ET
Businesswoman using digital tablet at office desk
Businesswoman using digital tablet at office deskGetty Images/Hero Images

There’s likely a smart TV, a Dropcam, a connected cloud storage drive (or some other connected device) on your corporate network—and your IT department doesn’t even know it. Based on research from OpenDNS’s Director of Research Andrew Hay, many of the world’s most heavily regulated or secretive industries, such as health care or energy, have devices on their networks that call out to unsecured servers or exhibit other behavior that should worry security professionals.

To be clear, his research, which was released this week, didn’t uncover a hack. The report detailed patterns of behavior about enterprise adoption of consumer connected devices and a lack of documentation from the makers of those devices that could be exploited in the future. So whether or not it is a Samsung Smart TV pinging servers in South Korea every five minutes or a lack of understanding and documentation about how a Nest thermostat or Dropcam connects, the report identified several trends worth discussing in corporate networking circles.

OpenDNS provides domain name resolution and security services to companies. It gathered data for this survey from clients and partners based on where devices in their network were calling out to other servers. From this, the company could observe what devices were on the network and what servers and clouds those devices were pinging. (As a side note, the data confirm that many Internet of things companies are hosting their services on Amazon’s cloud followed by IBM’s SoftLayer.)

opendnscloud

There were deeper insights in the report as well. For example, this warning: Connected devices look just like normal devices on the outside but they don’t behave like them on the inside. For example, a “smart” TV looks a lot like a “dumb” TV but regularly calls back to a server someplace and thus can be a digital security risk. Until smart devices look smarter, or we adapt to assume that computing and connectivity is all around us, communication among purchasing departments and information technology teams will be essential.

Another issue: Employees brought devices like Dropcam and Nest into organizations knowing they were connected but not seeming to care about the potential risks. Hay, who says Nest has a huge potential opportunity in the enterprise based on the devices he’s already seen connected, is pushing for consumer gadget manufacturers to beef up their documentation and security so they could be easily deployed in the enterprise.

At the very least it’s clear from reading the report that the old perimeter-based perspective on security should be eliminated. IT departments can’t police every device coming into their companies and should instead start thinking about understanding what’s on the network, how it behaves and approaching security as a dynamic problem that will require flexibility and proactive responses to a daily onslaught of problems.

Subscribe to Data Sheet, Coins2Day’s daily newsletter on the business of technology.

About the Author
By Stacey Higginbotham
See full bioRight Arrow Button Icon
Rankings
  • 100 Best Companies
  • Coins2Day 500
  • Global 500
  • Coins2Day 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Leadership
  • Success
  • Tech
  • Asia
  • Europe
  • Environment
  • Coins2Day Crypto
  • Health
  • Retail
  • Lifestyle
  • Politics
  • Newsletters
  • Magazine
  • Features
  • Commentary
  • Mpw
  • CEO Initiative
  • Conferences
  • Personal Finance
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Coins2Day Brand Studio
  • Coins2Day Analytics
  • Coins2Day Conferences
  • Business Development
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Coins2Day
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map

© 2025 Coins2Day Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Coins2Day Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.