Risk Mitigation in the Age of IoT

Risk Mitigation in the Age of IoT: Data Security Trends

I see what he did there! David Greetham of Level Legal has published a terrific new article on risk mitigation in the age of IoT!

In the article published in Legaltech® News on Tuesday (Dotting I’s and Crossing T’s: Risk Mitigation in the Age of IoT, available here), David discusses how the surging popularity of interconnected IoT (Internet of Things) devices—ranging from smart home gadgets like Alexa and Ring doorbells to large-scale commercial applications such as sensor-equipped trash cans—demonstrates the many potential benefits of smart technologies. However, the ubiquity of IoT devices also poses serious risks, particularly for businesses. Data privacy implications, data risk management, and even the technology itself can confuse corporations and the law firms that advise them.

So, David takes a few minutes to explore a couple of key issues related to IoT, where you’ll discover that focusing on the details—dotting I’s and crossing T’s—is the key to managing risk in this realm. And, by the end of the article, David promises you’ll know the meaning of the word “zettabyte.”

Advertisement
eDiscovery Assistant

I won’t steal too much of his thunder, but David does provide a couple of eye-popping stats:

  • Experts predict that there will be more than 207 billion IoT devices by the end of 2024.
  • We ran out of internet protocol version 4 (IPv4) addresses, the then-current version of addresses for IoT devices, a decade ago. This created the need for an updated protocol named IPv6. If every atom on Earth needed an IP address, IPv6 could accommodate each atom 12 times over. Wow.

Regarding that first stat, according to the World Population Clock, there are 8.1 billion people on Earth, so that means every last person on Earth will have an average of over 25 1/2 IoT devices!

David also provides a wild, but true (albeit, somewhat fishy 😉 ) example of how a casino was hacked via an IoT device – you’ll have to see it to believe it. Most importantly, he discusses several considerations for risk mitigation in the age of IoT, including simple steps that organizations can take to protect themselves. And he does tell you what a “zettabyte” is. 🙂

David’s article does a great job of dotting I’s and crossing T’s regarding IoT devices, for which I think he deserves a standing “o”. See what I did there? 😀

Advertisement
ModeOne

So, what do you think? Do you have a plan to secure the data within your IoT devices? Please share any comments you might have or if you’d like to know more about a particular topic.

Image created using Bing Image Creator Powered by DALL-E, using the term “robot listening to a small Amazon Echo device with the Amazon Echo device sitting on a table”.

Disclosure: Level Legal is an Educational Partner and sponsor of eDiscovery Today

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by my employer, my partners or my clients. eDiscovery Today is made available solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Today should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Leave a Reply