https://d5nxst8fruw4z.cloudfront.net/atrk.gif?account=pUuXo1IWhd10Ug
logo
How to protect your data in a connected world
April 8, 2018 | 7:04 PM
by Courtesy of NewsUSA
Ensure that sensitive data is encrypted and that encryption keys are stored in a separate and safe place.
 
Sharelines

The phrase ‘six degrees of separation,’ suggests that only a minuscule measurement is what divides one person from another. Today, the Internet of Things (IoT) has decreased those degrees dramatically, connecting us not only to each other, but to everything from our fitness trackers to our coffee makers.

In a world where everyone and everything is connected, digital security is a must-have, just as important as the lock on your front door or the keys to your house.

“Technology is revolutionising the way consumers use cars, homes, work spaces and everyday items,” Rep. Darrell Issa, California, told USA Today in a recent interview. “These devices raise both opportunities and questions about regulatory policy, spectrum space, privacy, and more.”

Experts warn what consumers need to understand that, although convenient, the IoT is an interconnected system, and security is needed to prevent a weakness in one device (like a SmartWatch) from becoming an open door to attack in another device (such as a connected car).



The good news is that sensitive industries such as banking, government, and healthcare have worked with companies like Gemalto, a global leader in digital security, to solve difficult security challenges. While most may not recognise the name

“Gemalto,” experts say that almost everyone uses at least one or two of the company’s solutions, which are embedded in a wide variety of connected devices, credit cards, passports, and ID badges.

So, to ensure that your data is protected from hackers, Gemalto recommends the following tips:

Secure the device. Sensitive devices need an added layer of protection, such as a SIM card or a tamper-resistant Secure Element that stores data in a safe place.

• Control the access. Implement two-factor authentication to ensure that only authorised people are granted access to the data.

• Secure the data. Ensure that sensitive data is encrypted and that encryption keys are stored in a separate and safe place.

STAY UPDATED
Subscribe to our newsletter and be the first to know all the latest news