Apply to MSS

First Name

Last Name

Phone

Email

State

Education

Check all that apply

Experience with a major consulting firm

Check all that apply

Certifications

Check all that apply

Experience

Check all that apply

Functional Experience

Check all that apply

Attach Cover Letter

Attach Resume

Join Our Talent Community

First Name

Last Name

Phone

Email

State

Education

Check all that apply

Experience with a major consulting firm

Check all that apply

Certifications

Check all that apply

Experience

Check all that apply

Functional Experience

Check all that apply

Attach Resume

facebook gplus linkedin sharethis

From Around the Web: Cybersecurity and the IoT



Categories
Archives
December 4th, 2017

Glenn Schulke (IoT expert, writer of IoT: A Tidal Wave of Trouble) recently shared with us what hackers could be able to do once cities reach a connected society. We thought of many petty pranks such as:

  1. Requesting your smart fridge to order 20 jars of pickles
  2. Adjusting the smart fridge temperature to 60 degrees Fahrenheit (spoiled food)
  3. Changing the smart thermostat every five minutes (higher electricity bill)
  4. Turning off the hot water heater from 5:30AM to 8:30AM (cold showers)
  5. Scheduling a time to turn the smart lights on and off at 3AM every night (haunted house)

It reminded us of haunted houses. Once you are out of a haunted house you can separate the scary events from reality and move on with your life. While many of the petty pranks above are relatively harmless, the results of hacking could be much more malicious. According to CNBC, in 2016 “cybercrime cost the global economy over $450 billion, over 2 billion personal records were stolen and in the U.S. alone over 100 million Americans had their medical records stolen.” The results of these cybersecurity breaches are horrifying and heart-breaking to those businesses and individuals affected. With IoT, this reality is coming to fruition, fast. However, business owners can protect themselves by taking necessary precautions with cybersecurity.

Read the full article here