8 Strategic Steps For Long-Term IoT Security
Submitted by Lindsey O'Donnell on
Identify Key Information
Rege stressed that business strategists should start by identifying the primary information flowing through their organization's network.
In particular, he said, companies should look at sets of data-feeding core computational systems. Even if that data is not collected or transmitted electronically, it may still be susceptible to ending up on a connected device.
"Wherever data collection or data consumption creates business value, you should expect to one day see connected (IoT) devices," stated Rege.