Human‑Centric Strategies for IoT Security in Manufacturing
While the Internet of Things promises unprecedented operational efficiency, it also introduces a vast attack surface that many manufacturers now regard with caution. Recent data‑breach headlines confirm that the risk is not theoretical—connected devices are growing at a breakneck pace, with estimates from McKinsey & Co. projecting 20 – 30 billion devices worldwide by 2020, up from 10 – 15 billion in 2015.
When I speak with IT leaders across the sector, “security” consistently tops the list of concerns. Yet protecting an IoT ecosystem is not just about firewalls and encryption; it is deeply rooted in corporate culture and the everyday behaviors of employees.
Assess the cultureThe first, most cost‑effective step is an honest cultural audit. Deploy anonymous surveys or focus groups that ask employees why they resort to workarounds such as “shadow IT.” For instance, if the IT team takes four weeks to produce a shipping report, the logistics team may store the same data in a personal cloud folder—exposing it to theft if a laptop is lost.
Measure the metricsReview the performance indicators that drive staff actions. Engineers who are on call 24/7 and must respond to every alarm may feel compelled to install a 4G‑enabled camera to monitor equipment remotely. While convenient, an unvetted hotspot can become a backdoor for attackers. Align metrics so that efficiency does not compromise security.
Address shadow ITImplement an “amnesty window” where employees can disclose unauthorized tools without fear of retribution. Once reported, evaluate each solution against your security strategy. After remediation, consider engaging a white‑hat hacker or penetration‑testing firm to uncover hidden vulnerabilities that insiders may overlook.
Make cybersecurity a continuous processSecurity is never a one‑time fix. Conduct regular spot checks, formal audits, and mandatory training that reinforces the danger of phishing and other social‑engineering attacks. Leadership should lead by example—model questioning strangers in hallways, starting meetings with security reminders—mirroring the safety protocols long ingrained in manufacturing.
These measures apply to all technology deployments, but they are especially critical for IoT‑enabled enterprises because of the sheer breadth of devices involved. A robust human and cultural foundation can be the difference between a resilient network and a costly breach.
Marcia Elaine Walker is the Principal Industry Consultant for Manufacturing at SAS. Follow her on LinkedIn or @MWEnergy on Twitter. Follow SAS news @SASsoftware on Twitter.
Internet of Things Technology
- Proactive Strategies to Secure IoT Development from the Ground Up
- Securing the Internet of Things: The Product Manager’s Imperative
- Monitoring the Internet of Things: Ensuring Secure, Reliable IoT Networks
- The Internet of Things: Human Insight Remains Essential
- Securing the IoT Landscape: Key Threats and Strategic Solutions – Part 2
- IoT Security: Unpacking the Unique Threat Landscape for Connected Devices (Part 1)
- Future-Proofing IoT Security: Expert Strategies for a Safer Connected World
- Securing Industrial IoT: Practical Strategies for Cyber‑Physical Systems
- 3 Key Obstacles to Successful Industrial IoT Implementation
- Could Bug-Inspired Neural Networks Revolutionize AI for the Internet of Things?