– Consumers lack confidence in IoT device security

small_business_stickyGemalto reveal how consumers lack confidence in IoT device security and businesses across the world are calling on governments to step in and regulate the industry

‘It’s clear that both consumers and businesses have serious concerns around IoT security and little confidence that IoT service providers and device manufacturers will be able to protect IoT devices and more importantly the integrity of the data created, stored and transmitted by these devices,’ says Jason Hart, chief technology officer, data protection at Gemalto.

‘With legislation like GDPR showing that governments are beginning to recognise the threats and long-lasting damage cyber-attacks can have on everyday lives, they now need to step up when it comes to IoT security. Until there is confidence in IoT amongst businesses and consumers, it won’t see mainstream adoption.’

To read the full article click here. – Mind the (breach) gap: Businesses confident on their cyber security

small_business_stickyGemalto research reveals businesses overly confident about keeping hackers at bay, but less so about keeping data safe.

‘It is clear that there is a divide between organisations’ perceptions of the effectiveness of perimeter security and the reality,’ says Jason Hart, vice president and chief technology officer for data protection at Gemalto.

To read the full article click here. – Is 2017 going to be the year of the data integrity breach?

small_business_stickyHere, Jason Hart from Gemalto gives us his top tips for businesses to avoid being the next big damaging security breach headline.

Data breach attacks are set to send shockwaves throughout the world in 2017, with at least one ‘almighty’ breach disclosure of this type expected next year, according to Jason Hart, CTO data protection of Gemalto.

“… ‘The first generation of cyber-attacks focused on stopping access to the data, which quickly moved on to stealing it. Today, we’re starting see to more and more evidence that the stolen data is being altered before transition, effecting all elements of operations. With the increasing uptake of the Internet of Things, hackers have more attack surfaces and personas that they can manipulate….”


To read the full article click here.