Applications

IoT and security: challenges of data privacy in a connected world

13 February 2025
From industry to healthcare, finance, or energy: regardless of the sector, the Internet of Things (IoT) is a true growth driver for companies. While the adoption of an increasing number of connected devices offers numerous advantages (employee productivity, company profitability, user experience, operational efficiency, etc.), it also brings its share of challenges, particularly in terms of security. How can we meet the security requirements of IoT today? Let’s take a closer look.

Security in IoT: current state

Within companies, the presence of unsecured devices connected to the network poses significant risks. Since the adoption of IoT is still relatively recent, many organizations have not yet fully realized the dangers and have implemented standard security systems for their IT infrastructure.

Adding to this challenge is the deployment of IoT devices in each business department. The problem? Traditional security systems are not equipped to identify specific types of connected objects and the risks associated with these devices. And these risks are numerous: sensors, security cameras, printers, portable scanners, lighting… Each IoT device has its own components and operating systems, each of which can introduce risks of hacking and interception.

Data privacy in IoT: why is it important?

Beyond the hacking risks for companies, data privacy is another critical aspect of security to consider. From patient health data to user location information, the data collected can often be highly sensitive. It is therefore crucial that companies are able to store and process personal data securely and guarantee users the respect of their privacy.

Moreover, ensuring data security is essential in complying with current regulations. Labor codes, GDPR, CRA, NIS 2 Directive, Cybersecurity Act… The regulatory framework is currently as dense as it is demanding. Organizations such as the National Cybersecurity Agency (ANSSI) can provide guidelines to help organizations better protect themselves against cyberattacks. Non-compliance with these rules can indeed result in severe penalties.

>  Also readWhat are the regulations concerning IoT?

Connectivity: a key choice for IoT security

IoT communication protocols enable devices to connect with each other, the cloud, and the Internet. To send information over short distances, “short” wireless networks such as Wi-Fi and Bluetooth are commonly used.

To connect equipment and infrastructure over long (or short) distances, organizations often favor long-range networks, particularly cellular networks (3G, 4G, 5G), NB-IoT, and LTE-M. One reason? Security.

Cellular connectivity is significantly more secure, making a device connected via Wi-Fi easier to hack than one connected via 5G. Moreover, security improves with each new generation: 3G offers more robust protection compared to 2G, and 4G does the same compared to 3G. Currently being deployed, the 5G network provides substantial cybersecurity benefits, especially for critical applications.

 

Securing IoT devices: what solutions?

Given the increased risks, it is urgent to enhance the security of IoT devices. But how?

Implementing Strong Authentication Mechanisms

IoT devices with poor authentication (such as default passwords) are an open door for hackers aiming to easily access the devices and the networks they are connected to. Among the effective methods used to secure IoT devices is the use of digital certificates.

Training and Hiring Experts

Managing IoT security involves the use of tools and detection solutions that allow for quick anomaly detection, risk assessment, and proactive threat neutralization. For large-scale deployment security, it is essential to train IoT managers within companies. Their missions include designing the appropriate architecture and making suitable choices based on the risk level of their specific use cases.

Software Updates

It is crucial that IoT devices are updated with every vulnerability fix released by the manufacturer. The goal is to reduce the risk of vulnerability to attacks. Similarly, unnecessary and unused functions should be disabled, as having more open ports increases the attack surface.