Tag Archives: IoT

PR Hot Take – The Age of IoT in Media

The Internet of Things (IoT) is a technology phenomenon that is changing the market landscape and growing at an exponential rate. Trillions of dollars are already funnelled into IoT development each year, and that amount is forecasted to increase each quarter. IoT brings with it a wealth of market opportunities for everyone, almost no industry is untouched by IoT. With such a focus on IoT, it’s only fitting that the media leaps at the chance to leverage commercial IoT specifically, essentially causing a media evolution.

The question becomes, what does this mean for PR pros and their clients? Who’s who in the commercial IoT media game? Which topics, specifically, are they covering?

To answer these and other questions, we took a snapshot of the media landscape over the past three and a half months and have some interesting insights.

Commercial IoT sits somewhere in between the IoT tech that connects consumer products (like our refrigerators) and industrial IoT (like connecting the machines manufacturing cars). Commercial IoT relates to those technologies that play an organizational role in society as opposed to a consumer-oriented or infrastructural one. Some examples include smart street lighting or connected car platforms that tell us when our car is due for service appointment. This means that media coverage of commercial IoT falls into both trade and business publications. So let’s get to the point: who’s covering commercial IoT?

When digging into researching commercial IoT coverage opportunities, we first identified keywords that the media uses. In our research, we identified eight search terms to narrow media commentary down from all IoT technology into only commercial applications. “IoT” and “commercial IoT” were the key phrases used. Of course, using general IoT could potentially yield both industrial and consumer IoT results, so those articles were filtered out. Other terms we included focused on commercial IoT applications, like “smart cities” and “smart buildings.” (It’s also good practice to include these phrases “+IoT”). Other commercial IoT applications to consider are “retail+IoT” and “real estate+IoT.”

We took these eight keywords and used Google News, TechNews and Meltwater to plot out a  90-day timeline of all coverage spanning from June through September 2018. From the selected time period, we pulled a snapshot of articles that covered our selected topics. Although we can’t guarantee we were able to pull every single piece of coverage, we did find more than 100 relevant articles. We then categorized them by date, publication, offered a qualitative assessment to categorize the article as a feature or a brief, and then we evaluated the type of publication – looking at trade and business publications.

Just for clarification —  at 10Fold we categorize briefs as articles that mention our keywords in three paragraphs or fewer. Features are articles that include content in more than three paragraphs. To separate trade and business press, publications are differentiated based on their audiences and their style of coverage (for example Forbes writes stories that demonstrate business impact for business audiences, whereas Datanami writes technology stories for CIOs and technical architects).  

Who’s Who and What’s What in Commercial IoT Media
Based on our snapshot, below is the coverage separated by publication.

This pie chart absolutely demonstrates that a lot of publications, both business and trade, are covering commercial IoT. This charts also shows us that there are a lot of publications covering commercial IoT, in fact, over 60 publications just based on this research. This means that there are a variety of options when it comes to article placement and lots of opportunities for placement.

Forbes seems to have the largest share of this pie. So think big. Landing a placement in Forbes is a huge accomplishment for any public relations professional. Its relative dominance in the media landscape means that commercial IoT must be a topic worth covering. However, the more interesting note is that, after Forbes, the majority of articles are written by trade publications such as  IoT For All, Information Age and ZDNet.

So let’s break those down too:

Owned content in this regard refers to contributed articles from outside companies or staff featured in publications. Vertical publications specifically refer to trade press beyond technology (real estate or retail, for example). You can see that trade publications dominate, with over 50 percent of the articles in our snapshot. Seeing that owned content is low, it’s reasonable to infer that commercial IoT is a big enough deal that media outlets aren’t hunting for content, and a reporter may take your interview!

It is also important to note that there is a fair amount of business press coverage on this topic, and in our experience, business coverage is almost always better in the eyes of your clients!

But let’s revisit those keywords. How does our snapshot break down? Why is that even important? Well, take a look at this chart:

We can see that including “IoT” in the search seems to reveal even more results. This is significant for two reasons: the first being that IoT is a buzzword for media. You could infer from this that including “IoT” in pitches might be an effective tool to capture  the attention of reporters. The other insight? Verticals are a big part of commercial IoT, including retail, real estate and smart cities. Relating IoT news to these topics makes it appealing to media that cover vertical applications.

The Role of Social Media
Social media will absolutely amplify your Commercial IoT coverage.  So let’s talk Twitter, one of the most accessible and common social platforms for public relations plans. We looked into which companies, people and media outlets play the greatest role in the commercial IoT social sphere. Like the media share of voice, we took a quick snapshot of commercial IoT on Twitter. For the purpose of this project, we used Kred’s influencer score, which uses an algorithm to assess how frequently accounts are Retweeted, Replied to, Mentioned and Followed on Twitter to rank each account as a number between 1-1000.

Based on our research, the top individual Twitter user talking about commercial IoT is Dr. Ganapathi Pulipaka, PhD (@gp_pulipaka), who currently works at Confidential. An established data scientist, Dr. Pulipaka has an influencer score of 823. His influence is due in part to his over 45,000 followers. The next top Twitter influencer is Dominic Halpin (@domhalps), the founder of TechNative, a business technology publication focusing on product news, user reviews, research, survey results, and interviews with digital business thought leaders. His influencer score is 806, and he has over 34,000 followers. These two Twitter users could be valuable assets for tech companies that want to engage their audiences on social media and boost their own influence within the IoT technology community.

As for the highest-influence companies talking about commercial IoT, IBM Developer (@IBMDeveloper) is number one, with an influencer score of 865. With over 90,000 followers, IBM Developer has a significantly higher follower count than the second highest influencer, TechNative. TechNative (@TechNativeWire) coincidentally relates to Dominic Halpin, our second most influential individual Twitter user. TechNative has an influencer score of 813 and just over 38,000 followers. From this, we can assume that engaging TechNative as a company and Dominic Haplin as an asset of that publication may improve social metrics.

But perhaps just as important as social influencers is hashtag traction. Hashtags alert audiences to topics they are interested in, and are a proven way to increase followers and encourage engagement. We broke down commercial IoT into three categories to search for popular hashtags: general IoT, smart city IoT and real estate IoT. Here’s what we found using Keyhole.co, a site that calculates the number of posts and number of unique users detected using a hashtag within the last two weeks:

Notable is that the top two hashtags are the same for all three categories. This means that #IoT and #blockchain are probably used together. As a public relations company, this means that it’s possible to leverage one of these hashtags in order to strengthen association with the other. Tech companies should be utilizing these topics together since it’s already expected by the Twitter-sphere. What’s important to take away from the above chart is that #IoT is significantly more present than other hashtags. As a side note, this #IoT could easily be applied beyond the realm of commercial IoT, but it is nearly impossible to reasonably distinguish the categories of usage. What’s important, though, is that #IoT is so present that companies need to utilize it in order to stay relevant.

So, what does all this mean?
The media landscape for commercial IoT is developing at a rapid rate due to the acceleration of the application of the technology. Based on our research, there are plenty of opportunities for coverage in both the business press and trade press. By following the insights about publications and reporters, and using keywords and hashtags – PR professionals should have a field day delivering commercial IoT coverage and building social audiences.  

By Chelsey Crowne  and Morgan Eisentstot 

Don’t forget to subscribe to our newsletter to get our content and other updates straight to your email as soon as it’s posted!


Edge Computing is Set to Transform the Speed of Business – Here’s Why

Edge computing, also known as fog computing, is experiencing rapid adoption – this technology’s small footprint, real-time speed, security offerings and reasonable cost are setting it up to change the way businesses operate. Our clients are onto this exciting new technology, which has the potential to impact countless markets and applications.

Edge computing is catching on and is becoming more appealing to businesses. Findings from recent report issued by Business Insider showed that 40% of companies that provide IoT solutions reported that edge computing came up more in discussion with customers in 2017 than the year before.

The popularity of edge computing is partially a result of the exponential increase in IoT devices – personal, commercial and industrial. PWC estimates that $6T will be spent on IoT solutions between 2015 and 2020, and IDC estimates there will be 80B connected devices by 2025, generating 180 trillion GB of data. All of these devices increase the amount of data in the world and taking advantage of that data is where edge computing can provide some serious benefit to commercial and industrial users. The scope of this is massive – McKinsey Global Institute estimates IoT could have an annual economic impact of $3.9T to $11.1T by 2025.

So what is edge computing?
Edge computing takes place near the data source right on the edge of the cloud, hence the term “edge,” and includes data processing and clean up, analytics and machine learning. Some edge providers don’t check all of these boxes and use the cloud for those missing pieces, but the actual appeal of edge computing is that all of these capabilities take place as close to the data source as possible, not in the cloud. This isn’t to say that cloud computing has no place. After the initial round of edge computing has taken place on-site, the clean, relevant data can be sent to the cloud for further analysis and processing or to be stored. With that said, more companies are looking to tap into the power at the edge. In four years, 75% of enterprise generated data will be processed at the edge (versus the cloud), up from less than 10% today according to Gartner.

So how does it work?
There are a few key pieces of technology needed to make edge computing truly intelligent and valuable for those deploying an IoT strategy. According to a recent report from ABI Research, “an intelligent edge provides Complex Event Processing (CEP), ML capabilities and high performance stream processing with actionable analytics to any range of computing devices.” Considering IHS Markit forecasts installed IoT devices to increase to 31 billion in 2018, and with about half of those in industrial and commercial sectors, the ability to collect, process and analyze data from a multitude of sources through a CEP to find actionable insights is crucial.

Additionally, the ABI report states that edge computing should take advantage of existing resources, including deployed sensors, networks and storage, to minimize additional investments and add value within a matter of months. What’s more, the edge computer needs to exist within a small footprint of the devices, sensors and machines found in industrial and commercial settings – this often means within the size of a Raspberry Pi.

So what’s the big deal?
Edge computing can provide some serious benefits to businesses that produce a lot of data, those in remote locations and those that need immediate insights. Those that produce copious amounts of data can save on costs to transmit data to the cloud for processing. Think about it this way: if a company with 150,000 machines each of which is sending 1GB of data to the cloud every day at $.023/GB per month, that would wind up costing them over $103M a month. That is a huge investment on their part.

What about companies in remote locations? Edge computing enables them to make their data useful to them without constant connectivity to the cloud or data center. All of the benefits of edge computing can take place during network downtime and can be sent to the cloud or data center when the connection is live. Think about how useful this is for offshore oil rigs or isolated mining operations. These industrial players can still take advantage of data processing and the insights gleaned from machine learning at the edge in these remote locations meaning their businesses can still run as smoothly as if they were right next to a major city.

Speaking of insights, businesses that need immediate feedback to keep their operations running seamlessly and safely don’t have time to wait for the data to be sent to the cloud or data center for processing and then back to the machine to be applied. The difference of milliseconds can be the difference between a power plant catching a fault and halting operations or failing and impacting millions of lives.

Beyond the immediate insight and cost-saving benefits, edge computing offers an additional layer of security on top of organizations’ existing firewall and encryption systems. Many industrial and commercial companies are processing very sensitive, proprietary data that directly impact their operations and profits. By processing this data at the edge, on-premise, they’re reducing the risk of potential hacks and theft of sensitive data either in transmission to the data center or cloud or through weak access points in the cloud or data center. In the days of ransomware and malware like WannaCry or NotPetya, this added security benefit allows industrial organizations to rest assured their data, and profits, are safe.

So who’s doing it right?
10Fold is pleased to represent a few companies in edge computing that are working with some major names across the industry, including FogHorn Systems and FreeWave Technology. There are a number of organizations and consortia focused on enabling and improving edge and fog computing. Check out a few of them to learn more about edge computing and the impact it’s having on industrial and commercial applications:

NO FOLD ICON 15x15 Open Fog Consortium

NO FOLD ICON 15x15  EdgeX Foundry

NO FOLD ICON 15x15  Industrial Internet Consortium

By Kathleen See

Don’t forget to subscribe to our newsletter to get our content and other updates straight to your email as soon as it’s posted!

Ross Perich Selected as Judge on Project Kairos Panel at IoT World

Internet of Things World is the largest IoT event in the world and it features some of the most innovative technologies and strategies in the industry – as well as the companies at the forefront of this technology phenomenon. More than 12,000 executives, innovators, and thought leaders in the IoT ecosystem will gather in one place to discuss the latest trends and developments, creating the ultimate opportunity for networking, partnership building, and learning more about the industry and its growing importance.

This year, 10Fold VP Ross Perich will be participating in the Project Kairos event in conjunction with the broader IoT World conference. With a career of experience supporting companies in this IoT-connected world, Ross was chosen as a judge to select the best emerging IoT companies and provide guidance on their strategies. Contestants will have the opportunity to hear invaluable feedback on their company pitch, showcase their products and services, and build their business acumen.

Ross has an extensive background in IoT marketing for both public and private IoT technology companies – helping them build their share of voice and thought leadership – which has led to a significant increase in brand value for these organizations. With more than two decades of experience in tech PR, Ross leads the Enterprise and Mobility divisions for 10Fold, one of the largest independently owned integrated communications agencies strictly focused on complex B2B technology companies.   Ross will leverage his unique marketing insights to assess and advise on market readiness, company narratives, and strategies for building brand value through share of voice.

10Fold’s IoT clients include FogHorn, an IoT application deployment platform; Qylur, an intelligent systems company providing secure and safe access to public venues and attractions; Itron, a public smart cities and resource management company; and FreeWave, a manufacturer and designer of industrial and secure machine-to-machine wireless networking and communications solutions.

The Internet of Things World and Project Kairos events are sure to be eye-opening experiences for all attendees, so we encourage you to check them out! Looking for more information? Learn more here.

By Tyler Trainer

Launching an IIoT Disruptor – FogHorn Systems

The FogHorn Challenge and Opportunity
FogHorn Systems approached 10Fold with a bold vision to address a major challenge standing in the way of IoT proliferation: the lack of bandwidth. In industrial and commercial IoT environments with hundreds of thousands of sensors sending multiple terabytes of data to the cloud daily, monitoring and analyzing the data in real-time seemed impossible – time-intensive and cost-prohibitive.

10Fold’s Role
We knew we had to uncover industry and media preconceptions, and enlist industry analysts in validating FogHorn’s go-to-market strategy – including the problem its solution was addressing.
We began by identifying key differentiation for FogHorn’s solution and approach, which resulted in key messages that underscored FogHorn’s significance.

40+ stories – from stealth to first-to-market
22.7 M – monthly website page views from syndication of a single Tier 1 story
284.4K – social media reach (via Twitter) for FogHorn product launch
Within a year, FogHorn secured an impressive Series B round of $30M

NO FOLD ICON 15x15Wall Street Journal – FogHornTM Systems Raises $12M for Industrial Internet of Things

NO FOLD ICON 15x15Silicon Angle – Industrial group led by GE invests $12M in edge analytics startup FogHornTM

NO FOLD ICON 15x15IoT Evolution – FogHornTM Systems Secures $12 Million in Series A Funding IDG Connect – IIoT keeps pushing analytics closer to the edge

NO FOLD ICON 15x15InsideBIGDATA –  FogHornTM Announces Release of LightningTM Edge Intelligence Software for Industry IoT Solutions

NO FOLD ICON 15x15PacketPushers – FogHornTM: Real-Time Decision Making For IIoT

“I’ve partnered with 10Fold multiple times over the years because I trust their approach to delivering high-value PR strategies that support business growth. Since launching FogHorn’s Series A funding and product, Lightning ML, in 2016, they’ve helped us stand out from the IoT pack with recognition from The Wall Street Journal, Reuters, CIO and many others.”

                                  – David King, CEO FogHorn Systems

Find more insights on our work with FogHorn here.

AI, IoT Saves Lives

The Amazing Ways Coca Cola Uses AI And Big Data To Drive Success

“One of the first firms outside of IT to speak about Big Data and AI applications”

Coca-Cola has been a big player in the big-data space in recent years, and have shown many times their practical use of big data as a form to improve products. In 2012  chief big data officer, Esat Sezer, said “Social media, mobile applications, cloud computing and e-commerce are combining to give companies like Coca-Cola an unprecedented toolset to change the way they approach IT. Behind all this, big data gives you the intelligence to cap it all off.”

More recently, Greg Chambers, global director of digital innovation, has said “AI is the foundation for everything we do. We create intelligent experiences. AI is the kernel that powers that experience.”

More and more companies every day are adopting data analytics technologies and applying them to their marketing to optimize their products and create new ones, much like the case of Coca-Cola.

Disaster Response In The 21st Century: Big Data And IoT Save Lives

“Technology improves authorities ability to predict, prevent disasters”

Leveraging Big Data to predict, prepare, and prevent

Even before Harvey made landfall, organizations such as NASA, NOAA, and municipalities were using sensor data, surveillance and satellite imagery to predict not just where the storm was likely to impact, but also coordinate with first responders and law enforcement. This allowed them to identify staging locations, evacuation routes, likely flooding areas, etc., and to be prepared for the worst. Data collected from sensors and meters located throughout the region were mined and machine learning algorithms applied, in order to predict patterns and outcomes.

For example, clustering algorithms helped to determine the probability of where flooding would occur, and allowed agencies to devise a set of recommendations for evacuation routes, resource staging, and the identification of locations for shelters along these routes. The more data collected from past incidents, the more insight these agencies are forecast future behavior, using operations such as regression algorithms. This gives officials more detailed insight into potential problems before they happen, so they can allocate resources in a timely, data-driven manner. There is no doubt data mining played a critical role in the effectiveness of first responders which, in turn, led to a reduction in the loss of lives.

IoT sensors provide a huge potential platform for those that want to collect data. IoT is a fast growing market and with the right technology applied, it could provide extremely significant use cases. Not only is the data collected from these sensors helping preparations for hurricane Harvey as explained in this article, but they also have the ability to help with the aftermath. Smart IoT sensors applied across cities on their networks can alert them when certain areas are dealing with black-outs. During natural disasters like this one, some utility providers may be able to address affected areas with greater speed since they’ll be automatically notified on the statuses of effected areas.

Apple’s FaceID: Get ready for ‘big data’ to get even bigger

“Big Data cemented as trending up”

It’s not just Apple utilizing the benefits of biometric and behavioral authentication. Organizations are realizing the treasure trove of contextual insights and valuable information about customers that are available through sensor-based, ground-breaking technology.

Organizations use big data analytics to monitor the behavior of a consumer, or potential consumer. Insurance agencies can benefit from such data to assess everything from driving behavior or home settings to reduce in-home risks, to health risks based on daily habits and routines to detect anomalies. Healthcare organizations can perform remote monitoring, while the automotive industry can profile drivers via connected cars and autonomous vehicles. Even apps like Maps, Camera, Weather and Uber use location services to cater to users based on their location. Big data is getting bigger, but that’s not necessarily a bad thing.

Transparency will be key going forward. As people often don’t fully read through privacy statements because of their length and complexity, government mandates, such as the EU’s pending General Data Protection Regulation are beginning to require organizations to present privacy statements in a “clear, transparent, intelligible and easily accessible form — using clear and plain language.”

In this article, Dutt speaks on how organizations can gain valuable insights from Apple’s new FaceID sensor. He touches on one of the most talked about issues engulfing the world of big data today, privacy. Dutt explains that if Apple does intend to collect data using the facial recognition software, they should be as transparent as possible, using easy to understand clear language to avoid any issues regarding data protections. Although the data collected from this could bring incredible insights, it would be safe for Apple to proceed with the caution and transparency.

Enjoy your read? Check out our other content here.

U.S. Security, IoT Vaccines?

U.S. Government Cybersecurity Ranks 16th Out of 18 Industry Sectors

“Very small improvement over last year”

The U.S. government’s cybersecurity standing (both state and federal) is ranked 16th of 18 industry sectors in a new report published by SecurityScorecard, a firm that seeks to help business manage third- and fourth-party risk. This is a very small improvement on the nations position last year, which was 18th out of 18. This still presents a disappointing  and dangerous scenario of public sector readiness to defend systems against cybercrime and cyber espionage. The report was generated by collecting and analyzing subject data through its own data engine, ThreatMarket — which uses 10 categories such as web applications, network security, and DNS health.

Is Your Mobile Carrier Your Weakest Link?

“Mobile security more important than ever”

Now that more online services than ever now offer two-step authentication, i.e., requiring customers to complete a login using their phone or other mobile device after supplying a username and password, many services relying on your mobile devices for that second factor, there has never been more riding on the security of your mobile account. Click the link for a few tips to ensure your mobile device (or, more specifically, your mobile carrier) isn’t the most vulnerable link in your security chain.

This Mirai malware vaccine could protect insecure IoT devices

“Poorly protected IoT devices are the source of many problems”

The hazard of unsophisticated and poorly secured Internet of Things devices came to the front last year with the Mirai DDoS attack that involved nearly a million bots. Many of these devices remain a threat. Researchers have now posed an original solution to the problem: Use the vulnerability of these devices to inject a ‘white worm’ that secures the devices. It is an epidemiological approach that creates immunity with a vaccine by exposing the immune system to a weakened form of the disease.

Enjoy your read? Check out our other content here.

Playstation Hack, IoT Security

PlayStation Hack Affects Twitter Account

“What happened with PlayStation security”

The official PlayStation Twitter account has been subject to a security breach today, with hacking group OurMine supposedly taking responsibility. The only real evidence thus far comes from the affected account itself, with messages from the social feed allegedly coming from the group posted on the PlayStation Twitter. One also claimed that the PlayStation Network had been compromised, so any users may want to change passwords and other sensitive information.

How to improve IoT security

“Security and privacy risks always increasing”

A recent study from researchers at the technical University of Denmark, Sweden and many more, titled ‘Internet of Hackable Things’, have outlined the new privacy issues that surround the devices. Industries of particular concern include smart devices in healthcare, smart homes, and building operation faculties.

50% of Ex-Employees Can Still Access Corporate Apps

“Businesses drive risk of breaches”

Often times when employees are terminated or move to new roles elsewhere, firms forget to end access to corporate applications. Researchers at OneLogin have polled 500 IT managers to learn how they terminate staff login information and credentials in-house. Initial results trend towards administrators are not doing enough to protect against the potential breach risk from ex-employees.

Enjoy your read? Check out our other content here.

Scottish Parliament, IoT Regulation

Scottish Parliament targeted in ‘brute force’ cyber attack

“External sources with similar tactics to Westminster incident”

Officials have now stated that the attack on the Scottish Parliament was part of a ‘Brute Force’ cyber operation. Sir Paul Grice confirmed the attack in a message to the MSP’s and staff with statedomain email addresses, urging caution and security practices. “Robust cyber security measures” identified the attack early, and systems “remain fully operational”.

USB Ports Could Be Silently Leaking Your Personal Data To A Malicious Device

“An unfortunately convenient way to steal data”

External hard drives and USB sticks are seen as the most common and often reliable way to securely store and move data. However, an Australian research team has shown that this may not be as secure as we previously thought. Many ports that individuals plug devices in can be leaking personal data remotely, giving criminals access to sensitive information.

Cost of insider threats vs. investment in proactive education and technology

“Which is more important”

Security education is becoming incredibly more important in the increasingly digital age. Technology based defense solutions are incredibly important in preventing attacks and saving organizations significant sums of money.

Who can regulate the IoT?

“Will permeate all of life”

The Internet of Things promises to make life significantly easier, but possibly more complicated at the same time. Security concerns grow everyday over the inter-connectivity of all of these devices. This leads many experts to advocate for organized and proper regulations, with harsh penalties that apply to those who do not comply.

Enjoy your read? Check out our other content here.

GDPR, Law and IoT

New Trojan malware campaign sends users to fake banking site that looks just like the real thing

“False login ages steal sensitive info”

A credential stealing trickbot banking malware has been engaging in a email spam campaign that gives users a fake webpage that is nearly identical to the original. Online banking users in the US, UK, Australia, and many other countries have been affected, and this number is expected to grow as those developing it have been experimenting with EternalBlue. This was the exploit that allowed WannaCry and Petya to spread so efficiently.

Can U.S. lawmakers fix IoT security for good?

“Inter-connectivity leaves devices vulnerable”

Several U.S. Senators believe they have proposals that will aid in preventing the attacks that have plagued IoT devices in the last few years. The proposed solutions, put forward in the Internet of Things Cybersecurity Improvement Act of 2017. Many expert analyses of the IoT Act reveals that it’s likely a hearty step in the right direction, but it may not be enough to stop the tide of attacks that cause major issues for many people.

How to protect personally identifiable information under GDPR

“New rules grant more rights in PII for consumers”

The GDPR goes into force May 25, 2018, impacting many firms worldwide that process data for EU citizens. Heavy fines and other penalties are due to the companies that do not enforce the more rigorous personal identifiable information (PII) regulations, often up to 4% of a firms yearly revenue. Breaches are also required to reported with three days.

Ex-NSA Analyst Raises $10 Million To Stop Hackers Destroying Power Grids

“Infrastructure targets more popular”

Part of an espionage mission to disrupt critical services began in 2013, when a U.S. dam was targeted by mercenaries hired by Iran’s revolutionary Guard Corps. This relays the importance of national cyber security, recognized by Rob Lee, who was once part of National Security Agency and currently co-founder at infrastructure-focused cybersecurity firm Dragos Inc. The firm has recently raised $10 million in Series A funding for its goals, and a recognition of the seriousness of the situation.

Enjoy your read? Check out our other content here.

IoT Security Standards, SME Ransomware

New Bill Seeks Basic IoT Security Standards

“Baseline security standards for broad range of devices”

U.S. Senate legislators are working to create minimum regulations to ensure internet connected devices such as cameras,routers, and computers. The standards will also enforce holes in current cybercrime laws and was developed in direct response to the series of massive 2016 attacks using IoT devices, like the October and November Mirai attacks that put down many high profile websites for the better part of the day.

Study: Majority of retailers feel ‘vulnerable’ to a data breach

“Attacks decline, but business concern is up”

Security analyst firm 451 Research has recently released the “2017 Thales Data Threat Report, Retail Edition,” which has indicated a growing consensus among retailers that their payment systems are vulnerable to hackers. The study is based on survey answers from over 1100 senior executives globally. 52% of the companies have experienced a breach in the past, 88% fear they are vulnerable, and 19% feel ‘very’ or ‘extremely’ vulnerable.

One in three SMEs in Singapore hit by ransomware

“Nearly one fifth had to shut down businesses”

Over one third of SME’s in Singapore were attacked by ransomware attacks in 2016, and anout 20% of these had to close their doors as a result. 61% of the Singapore SME’s also had to shut down for over nine hours, about one business day, shutting down operations.

Enjoy your read? Check out our other content here.