Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceCybersecurity News

Top security considerations for enterprises planning IoT adoption

By Laurent Soubielle
iot-enews
September 29, 2020

Amid the business disruption caused by the ongoing pandemic, more and more enterprises are recognizing the Internet of Things’ (IoT) vast potential to help them stay competitive. The IoT offers enterprises superior visibility into their operations, enabling organizations to maintain control and stay agile—even in the face of market uncertainty. For these reasons, it’s no surprise that BI Intelligence reports that those who adopt IoT can experience increased productivity, reduced operating costs and expansion into new markets.

However, despite the IoT’s promise, there remains one common barrier to adoption—concerns over the technology’s security. According to Syniverse, more than 50% of organizations cite data, network and device security as their biggest challenge when it comes to deploying and managing IoT solutions. Fortunately, IoT advancements have made it so that enterprises needn’t choose between productive operations and organizational security when choosing their deployments.

That being said, there is no one-size-fits-all IoT security solution. Organizations need to spend time selecting an IoT solution that maps to their unique business needs to ensure they’re able to maximize the investment’s potential without creating any security liabilities. Here’s what enterprises need to consider when creating their IoT deployments.

 

What type of data are we collecting, and how often will we be collecting it?

One of the IoT’s draws is its ability to collect data and deliver insights that drive business forward. In order to maximize this opportunity, organizations need to first assess which information they intend to collect, as well as the frequency at which they’ll collect it.

This knowledge will help organizations determine how complex their IoT security measures need to be. Not all information requires the same level of protection. For example, low-impact information like the humidity levels in a warehouse doesn’t need the same level of protection that critical information, such as the location of pharmaceutical products, does.

Organizations should also consider how often they need to collect their data, as the number of access points increases their security risk. The constant transmittal of data—say, multiple updates per hour—requires IoT devices to have continuous connection to a network. While this constant connectivity means organizations can access their information whenever they need it, it also means that hackers have more opportunities to get into the network and access the information on the devices connected to it. Therefore, the more often enterprises transmit information, the more precautions they need to take to guard their data.

 

Which system provides the security we need for our IoT application?

Enterprises that need to frequently transmit data will generally require their devices to have IP addresses in order to maintain constant connectivity to the internet. However, IP networks are more susceptible to being breached by hackers, who can discover those addresses and enter the devices. Because of this threat, organizations—especially those responsible for large quantities of high-value information—need to have a backup system established in the event they need to quickly shut down their devices. 

A 0G network is a good option for a backup. This wireless network is specifically designed to transmit small amounts of key information at regular intervals from the devices to the IoT, all while conserving power. As such, it does not rely on synchronized two-way communication between the device and the receiver. Instead, devices connected to this network operate on a lower frequency, waking up when they’re prompted to send their data—asynchronously—and then returning to sleep mode. With the devices essentially powering down when they’re not in use and accepting data only when it requests it, hackers have no way to remotely break into the network and take control of devices. Because it is not connected to the internet and jamming resistant, a 0G network can act as a 24/7 alarm system for the primary network. If hacking or RF jamming is detected and the primary network is consequently compromised, devices connected to the 0G network can send distress signals to shut down the system, preventing hackers from invading further.

A 0G network can also excel as an enterprise’s primary network if the company doesn't require a constant flow of large pieces of information. Providing both the protection and connectivity desired for continuous, secure operations, a 0G network is well suited for simpler use cases like collecting shipping container temperatures, in which small quantities of less-attractive data only needs to be transmitted one or twice per day at random times.

As enterprises look for ways to operate more efficiently in the digital age via the IoT, security remains top of mind for many executives. Fortunately, there are options for mitigating risk while using IoT solutions to derive meaningful insights that drive business forward. By turning to simple—though highly safeguarded—IoT devices running on a 0G network, organizations can harness the opportunities afforded by the IoT without compromising the security of their businesses.

 

KEYWORDS: COVID-19 cyber security Internet of Things pandemic risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Laurent Soubielle is IoT Agency Director at Sigfox USA.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Technology

    Considerations for enterprises amid new privacy regulations

    See More
  • barrier-enews

    Top 3 Considerations for Selecting the Right Perimeter Security Solution

    See More
  • User experience at top of mind for security professionals

    New survey shows security versus the user experience remain at top of mind for enterprises

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Physical Security and Safety: A Field Guide for the Practitioner

  • 150 things.jpg

    The Handbook for School Safety and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing