Securing the Global IoT: Three Essential Steps
A logistics provider could deliver real‑time parcel tracking to its customers.
In 2017, Gartner projected that 20 billion connected devices would be in circulation by 2020. The landscape has evolved dramatically—especially over the past year, according to Mikael Schachne, CMO and VP of Mobility & IoT at BICS.
The COVID‑19 pandemic accelerated the adoption of digital services and infrastructure across consumer and commercial sectors. Seamlessly embedding connectivity into everyday objects, linking them to the global IoT, and effectively managing these assets have become critical.
IoT applications span a broad spectrum: utilities can embed connectivity into smart meters to monitor consumption and offer personalized tariffs; logistics firms can provide live parcel visibility; and manufacturers of remote patient‑monitoring devices must guarantee global usability for healthcare providers.
Managing Security & Complexity
Beyond connecting devices, organizations must manage them—an effort that hinges on robust IoT security.
According to Nokia’s Threat Intelligence Report 2020, IoT devices now account for nearly one‑third of all security breaches on mobile networks, up from 16.17% in 2019.
IoT deployments typically involve intricate ecosystems, spanning diverse stakeholders, use cases, access technologies, and device layers. Each layer introduces unique risks—data interception, impersonation, location tracking, denial‑of‑service, and SIM‑swap attacks, among others.
Because IoT spans such a wide array of verticals, the stakes are high. Picture a threat actor commandeering endpoints in an industrial IoT environment—say, a processing plant or smart grid.
Capitalizing on the global IoT’s promise demands not just connectivity and asset management, but also a firm commitment to security.
Enhancing IoT security involves three pillars: adopting a connectivity platform with built‑in security controls, leveraging a private IPX backbone, and fostering collaboration across the ecosystem.
- Adopt a Connectivity Platform
Connectivity platforms empower any industry to launch and monetize IoT solutions without a telecoms background. They simplify troubleshooting, enable seamless data integration with back‑end systems, and provide real‑time asset tracking.
Key security capabilities—network firewalls, anomaly detection, fraud prevention, real‑time geolocation, and secure back‑end integration via VPN or IPX—are built into these platforms.
Because many organizations lack expertise in device connectivity and its security, platforms must adopt a proactive security posture. What does that look like in practice?

Imagine a warehouse logistics manager tracking pallet shipments to guarantee on‑time arrival. A connectivity platform offers passive visibility into each pallet’s location and connectivity, while proactively flagging network congestion, disconnections, or anomalous traffic patterns. Notifications can be dispatched via email, SMS, or integrated APIs.
IoT workloads tend to follow predictable patterns. If a device slated to transmit a 1 MB weekly report suddenly spams data, it signals a potential compromise. A smart platform can autonomously throttle or block traffic, neutralizing threats before they inflict damage. In 2021, cybercrime losses could hit $6 trillion (€4.94 trillion), matching the GDP of the world’s third‑largest economy.
- Use a Private IPX
Securing the IoT further involves deploying a private IPX. IPX, governed by international carriers, delivers end‑to‑end connectivity—data, signalling, voice, and messaging—along with transport, proxy, and hub services, guaranteeing premium quality and ultra‑secure links.
By linking mobile operators and worldwide points of presence, a secure IPX becomes the global backbone for IoT traffic. Organizations can connect securely—whether from on‑premise data centres or public clouds such as AWS, Google Cloud, or Azure—via an IPX tunnel that remains isolated from the public internet. This isolated pathway is essential, as the cloud hosts the valuable data that attackers covet.
- Collaborate and Co‑operate
The final pillar is collaboration. The IoT ecosystem is vast—encompassing device makers, MNOs, MVNOs, niche IoT entrants, and legacy telcos that supply the backbone.
Co‑operation across all stakeholders is essential to safeguard the ecosystem. Industry groups—GSMA, GSA, and the ITW Global Leaders Forum—drive best practices, while carriers and IPX operators bridge the telco and digital domains.
Digitalisation accelerated in 2020 and remains entrenched. As more entities embed themselves into the global IoT, every participant must adopt the necessary security measures. Leveraging connectivity platforms, private IPX, and industry collaboration will empower organisations to safeguard their customers and their bottom line.
The author is Mikael Schachne, CMO and VP of Mobility & IoT, BICS.
Internet of Things Technology
- Four Proven Steps to Turn IoT Data into Actionable Insights
- U.S. IoT Security Law Sets New Standards and Liability Requirements
- Why No Universal IoT Security Standard? Understanding the Complex Landscape
- IoT Security Services Market to Reach $8 B by 2026 Amid 5G Expansion
- Cypress Enhances IoT Security with PSA‑Certified PSoC 64 MCUs
- IXrouter: Seamless Edge‑to‑Cloud Connectivity for Industrial IoT
- How to Launch a Career in IoT Product Management: 5 Proven Steps
- How Health Insurers Can Embrace IoT in Three Strategic Steps
- Fleet Connectivity Demands: A Call for 5G Adoption in IoT Fleet Management
- Six Proven Steps to Secure Your Industrial IoT Platform