© 2014 KlugTech www.klugtech.com
Data Security
Privacy – we need it, why don’t
companies provide it?
Thom Poole

Chief Innovation Officer
© 2014 KlugTech www.klugtech.com
State of Play
•  The Internet of Things (IoT) is already here
•  Connected devices talking to one another
•  Ambient Intelligence (AmI) – making decisions
•  Can be found in:
•  Domestic
•  Enterprise
•  Transport (vehicles &
networks)
•  Healthcare
•  Utilities
•  Public sector
•  Retail
•  Education
•  Cities & urban
developments
•  Agriculture
© 2014 KlugTech www.klugtech.com
© 2014 KlugTech www.klugtech.com
Security
4 key factors
•  Something you KNOW
•  Something you ARE
•  Something you DO
•  Something you HAVE
© 2014 KlugTech www.klugtech.com
Something you KNOW
•  Password
•  Username
•  Personal details (mother’s maiden name, etc.)
•  Contact details
BUT: Once compromised, published or stolen – it cannot be used again
Human’s are often sloppy in their security with this (reveal it readily, or

use the same details for multiple sites)
© 2014 KlugTech www.klugtech.com
© 2014 KlugTech www.klugtech.com
Something you ARE
•  Biometrics – fingerprints, iris/retina scans, voice
print, facial recognition, etc.
BUT: once the data is digitised, it could be compromised. It can, however, not

be easily faked (at the moment)
© 2014 KlugTech www.klugtech.com
Something you DO
•  Generally a gesture or tick
BUT: Can easily be mimicked. Once the gesture is digitised, it could

be compromised
© 2014 KlugTech www.klugtech.com
Something you HAVE
•  A device (mobile
phone, key fob
passcodes, etc.)
•  A key
•  An access app or
programme
© 2014 KlugTech www.klugtech.com
© 2014 KlugTech www.klugtech.com
Data Management
•  People and companies entrust
sensitive data to others, but if

data management is insecure…
•  Recent breaches include some
big-name companies
•  So who can you trust?
© 2014 KlugTech www.klugtech.com
CRM
•  Database driven marketing
•  Stores all customer data, transactions
•  Users can access all information, download,
etc.
•  Open to abuse
© 2014 KlugTech www.klugtech.com
© 2014 KlugTech www.klugtech.com
Security Management
•  Too trusting of people
•  Rely on a single factor – Something you KNOW
•  Intelligence is flawed
•  Trust must be restored
•  People have too much access to too much information, and have
consistently proven themselves as a weak link.
•  Over reliance on a password, which is required in full. Back up
factors such as mother’s maiden name is also frequently asked,
and too easy to get hold of.
•  Machine intelligence is too easy to breach as it stands, and is
therefore flawed.
© 2014 KlugTech www.klugtech.com
Riskiest Employee Practices
1.  Accessing the Internet via
unsecured wireless networks
2.  Failing to delete unnecessary
but confidential information
from computers
3.  Sharing passwords with
others
4.  Using the same username/
passwords
5.  Using generic portable drives
without proper encryption 
6.  Leaving computers
unattended & unsecured
7.  Failing to notify firm after loss
of portable drives
8.  Failing to shield screens/
data when working in
insecure areas
9.  Carrying/accessing
unnecessary sensitive
information
10.  Using personal devices to
access company networks
© 2014 KlugTech www.klugtech.com
© 2014 KlugTech www.klugtech.com
Swiss Banks
•  Trusted ‘secret-keepers’ for decades
•  Accounts were ‘numbers’
•  No recorded mass breaches
•  Still have a good reputation
Banking secrecy was enshrined in Swiss law since 1934 – and only
amended in 2004. It could be argued that the amended view is not
yet fully complied with.
© 2014 KlugTech www.klugtech.com
Learn from the Secret-Keepers
•  Have to KNOW your number
•  Have to HAVE your key
•  Have to HAVE some identity
•  Have to KNOW which bank
A single element was not enough…
Why is it OK for the IT industry?
© 2014 KlugTech www.klugtech.com
© 2014 KlugTech www.klugtech.com
Physical Security
•  We can use a range of measures to keep people
out, and/or away from sensitive data files and
servers
•  Why do all files need to be in one place (eggs &
baskets!)?
•  Why do individuals need access to ALL the
information… ever?
© 2014 KlugTech www.klugtech.com
© 2014 KlugTech www.klugtech.com
Security Example
Would you leave your car…
•  On the highway
•  With the keys
•  Unlocked
•  With the registration documents
Datacentres are often know, or signposted
Physical access can be overcome – in datacentres, physical
access needed be on site, it can also be via the internet
Data is often in unencrypted files – encryption is only
involved in the transfer process
Data is often stored together – so usernames, passwords,
personal data, etc., are all grouped together, so even a
minor breach could provide a complete view of a customer
or group of customers
© 2014 KlugTech www.klugtech.com
What’s Stopping You?
•  Take security seriously
•  Split up your databases
•  Use encrypted, multi-point security
•  Limit data access
•  Keep parts of your system clean & free from all
outside influences
•  Work with your customers
© 2014 KlugTech www.klugtech.com
© 2014 KlugTech www.klugtech.com
KlugTech
•  KlugTech was created to address the usability
and security of the Internet of Things
•  We have created a modular approach to
securing your systems, but a single, safe
interface
•  Domestic Solutions
•  Enterprise Solutions
•  Transport Solutions
•  Healthcare Solutions
•  Public Sector Solutions
•  Smart Power Solutions
•  Retail Solutions
•  Delivery/Logistic Solutions
•  Education Solutions
•  Smart City Solutions
•  Agricultural Solutions
•  Security Solutions
www.klugtech.com

More Related Content

PPTX
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
PPTX
You cant secure yesterday
PPTX
Not IF, but WHEN
PDF
20190523 Breach Notification Wizard: Lessons in Knowledge Management!
PPTX
Oper8 document management solution v2.0
PPTX
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
PPTX
BYOD - Mobility - Protection: security partnering with business
PPTX
Governance and Security in Cloud and Mobile Apps
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
You cant secure yesterday
Not IF, but WHEN
20190523 Breach Notification Wizard: Lessons in Knowledge Management!
Oper8 document management solution v2.0
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
BYOD - Mobility - Protection: security partnering with business
Governance and Security in Cloud and Mobile Apps

What's hot (13)

PDF
uLaw Security Simplified - Whitepaper
PPTX
Protecting the Castle: CYBER CRIME HAS BECOME THE NUMBER ONE PROPERTY CRIME ...
PPTX
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...
PPTX
A Brave New World
PPTX
Traklight | 85 Broads How to Prepare for Funding | IP
PPTX
Privacies are Coming
PPTX
Employee monitoring updated
PDF
Interview With Eric Vanderburg, Cyber Security & Privacy Expert
PPTX
Network nags - when security fails
PPTX
Securing your Data, Reporting Recommended Practices
PDF
MISA Cloud Workshop_ ipc privacy in the cloud
PPTX
Introducing Security Guardian from ExactTrak
PPTX
What is Information Security and why you should care ...
uLaw Security Simplified - Whitepaper
Protecting the Castle: CYBER CRIME HAS BECOME THE NUMBER ONE PROPERTY CRIME ...
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...
A Brave New World
Traklight | 85 Broads How to Prepare for Funding | IP
Privacies are Coming
Employee monitoring updated
Interview With Eric Vanderburg, Cyber Security & Privacy Expert
Network nags - when security fails
Securing your Data, Reporting Recommended Practices
MISA Cloud Workshop_ ipc privacy in the cloud
Introducing Security Guardian from ExactTrak
What is Information Security and why you should care ...
Ad

Viewers also liked (16)

PPT
How & Why SME's Go On The Internet
PDF
AM Briefing: Security for the internet of things
PDF
Security in Internet of Things(IoT) Ecosystem
PDF
Internet of Things Security Patterns
PPTX
Internet of Things Security
PDF
PCI DSS en la Nube
PPTX
Hardware Security
PDF
Enabling embedded security for the Internet of Things
PPTX
A survey in privacy and security in Internet of Things IOT
PDF
RootedCon 2017 - Workshop: IoT Insecurity of Things?
PPTX
Internet of things security "Hardware Security"
PDF
The competitive landscape of the Internet of Things
PPTX
Internet of Things Security: IBM HorizonWatch 2016 Trend Brief
PPT
IoT security (Internet of Things)
PDF
Internet of Things - Privacy and Security issues
PPTX
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
How & Why SME's Go On The Internet
AM Briefing: Security for the internet of things
Security in Internet of Things(IoT) Ecosystem
Internet of Things Security Patterns
Internet of Things Security
PCI DSS en la Nube
Hardware Security
Enabling embedded security for the Internet of Things
A survey in privacy and security in Internet of Things IOT
RootedCon 2017 - Workshop: IoT Insecurity of Things?
Internet of things security "Hardware Security"
The competitive landscape of the Internet of Things
Internet of Things Security: IBM HorizonWatch 2016 Trend Brief
IoT security (Internet of Things)
Internet of Things - Privacy and Security issues
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Ad

Similar to Internet of Things Security (20)

PDF
Secure CRM Management
PPTX
IT Security Management -- People, Procedures and Tools
PPTX
Windstream Cloud Security Presentation
PDF
Jms secure data presentation
PPTX
Internet Issues (How to Deal on Internet Security)
PDF
[Austria] Security by Design
PPTX
Secure End User
PPTX
Team black
PDF
How to Manage the Great BlackBerry Migration
PDF
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
PDF
Five Best Practices for Maximizing Mobility Benefits
PDF
3 steps security
PDF
Information Security Awareness Training
PDF
Users awarness programme for Online Privacy
PDF
How Privacy in the Cloud Affects End-Users
PDF
Google FIDO Authentication Case Study
PPTX
CipherCloud Webinar - Cloud Encryption & Tokenization 101
PDF
The Connected World
PDF
mobile_security best practices and protection
PDF
Don't Diligence Information Security for Lawyers
Secure CRM Management
IT Security Management -- People, Procedures and Tools
Windstream Cloud Security Presentation
Jms secure data presentation
Internet Issues (How to Deal on Internet Security)
[Austria] Security by Design
Secure End User
Team black
How to Manage the Great BlackBerry Migration
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Five Best Practices for Maximizing Mobility Benefits
3 steps security
Information Security Awareness Training
Users awarness programme for Online Privacy
How Privacy in the Cloud Affects End-Users
Google FIDO Authentication Case Study
CipherCloud Webinar - Cloud Encryption & Tokenization 101
The Connected World
mobile_security best practices and protection
Don't Diligence Information Security for Lawyers

More from Thom. Poole (20)

PPTX
Amersham on the Hill
PDF
Customer Satisfaction
PDF
Entrepreneur
PDF
Is the Smart Home fit for purpose?
PDF
Connected Cars - Do we need them?
PDF
Day in the Life of a Senior Marketer
PDF
Getting Recruited into Marketing Roles
DOCX
Speed in Digital Marketing (Arabic)
PDF
L'argumentation commercial pour la vitesse dans le marketing numérique
PDF
Der Business-Case für Beschleunigung im digitalen Marketing
PDF
Speed in digital marketing en
PDF
Publish a book
PPT
Marketing Bootcamp
PPT
The Business Case for CRM
PPT
The CRM Jungle
PPT
CIM CRM Workshop
PPT
Managing Business Customers on the Web
PPT
Trust and the marketing art of the opt-in
PPT
Mobile Mastery
PPT
Financing your business
Amersham on the Hill
Customer Satisfaction
Entrepreneur
Is the Smart Home fit for purpose?
Connected Cars - Do we need them?
Day in the Life of a Senior Marketer
Getting Recruited into Marketing Roles
Speed in Digital Marketing (Arabic)
L'argumentation commercial pour la vitesse dans le marketing numérique
Der Business-Case für Beschleunigung im digitalen Marketing
Speed in digital marketing en
Publish a book
Marketing Bootcamp
The Business Case for CRM
The CRM Jungle
CIM CRM Workshop
Managing Business Customers on the Web
Trust and the marketing art of the opt-in
Mobile Mastery
Financing your business

Recently uploaded (20)

PDF
LMS bot: enhanced learning management systems for improved student learning e...
PDF
Co-training pseudo-labeling for text classification with support vector machi...
PDF
EIS-Webinar-Regulated-Industries-2025-08.pdf
DOCX
Basics of Cloud Computing - Cloud Ecosystem
PPTX
Microsoft User Copilot Training Slide Deck
PDF
Early detection and classification of bone marrow changes in lumbar vertebrae...
PDF
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
PDF
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
PDF
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
PDF
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
PDF
Auditboard EB SOX Playbook 2023 edition.
PDF
Data Virtualization in Action: Scaling APIs and Apps with FME
PDF
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
PDF
INTERSPEECH 2025 「Recent Advances and Future Directions in Voice Conversion」
PDF
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
PPTX
MuleSoft-Compete-Deck for midddleware integrations
PDF
Lung cancer patients survival prediction using outlier detection and optimize...
PPTX
SGT Report The Beast Plan and Cyberphysical Systems of Control
PDF
The AI Revolution in Customer Service - 2025
PDF
Build Real-Time ML Apps with Python, Feast & NoSQL
LMS bot: enhanced learning management systems for improved student learning e...
Co-training pseudo-labeling for text classification with support vector machi...
EIS-Webinar-Regulated-Industries-2025-08.pdf
Basics of Cloud Computing - Cloud Ecosystem
Microsoft User Copilot Training Slide Deck
Early detection and classification of bone marrow changes in lumbar vertebrae...
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
Auditboard EB SOX Playbook 2023 edition.
Data Virtualization in Action: Scaling APIs and Apps with FME
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
INTERSPEECH 2025 「Recent Advances and Future Directions in Voice Conversion」
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
MuleSoft-Compete-Deck for midddleware integrations
Lung cancer patients survival prediction using outlier detection and optimize...
SGT Report The Beast Plan and Cyberphysical Systems of Control
The AI Revolution in Customer Service - 2025
Build Real-Time ML Apps with Python, Feast & NoSQL

Internet of Things Security

  • 1. © 2014 KlugTech www.klugtech.com Data Security Privacy – we need it, why don’t companies provide it? Thom Poole
 Chief Innovation Officer
  • 2. © 2014 KlugTech www.klugtech.com State of Play •  The Internet of Things (IoT) is already here •  Connected devices talking to one another •  Ambient Intelligence (AmI) – making decisions •  Can be found in: •  Domestic •  Enterprise •  Transport (vehicles & networks) •  Healthcare •  Utilities •  Public sector •  Retail •  Education •  Cities & urban developments •  Agriculture © 2014 KlugTech www.klugtech.com
  • 3. © 2014 KlugTech www.klugtech.com Security 4 key factors •  Something you KNOW •  Something you ARE •  Something you DO •  Something you HAVE
  • 4. © 2014 KlugTech www.klugtech.com Something you KNOW •  Password •  Username •  Personal details (mother’s maiden name, etc.) •  Contact details BUT: Once compromised, published or stolen – it cannot be used again Human’s are often sloppy in their security with this (reveal it readily, or
 use the same details for multiple sites) © 2014 KlugTech www.klugtech.com
  • 5. © 2014 KlugTech www.klugtech.com Something you ARE •  Biometrics – fingerprints, iris/retina scans, voice print, facial recognition, etc. BUT: once the data is digitised, it could be compromised. It can, however, not
 be easily faked (at the moment)
  • 6. © 2014 KlugTech www.klugtech.com Something you DO •  Generally a gesture or tick BUT: Can easily be mimicked. Once the gesture is digitised, it could
 be compromised
  • 7. © 2014 KlugTech www.klugtech.com Something you HAVE •  A device (mobile phone, key fob passcodes, etc.) •  A key •  An access app or programme © 2014 KlugTech www.klugtech.com
  • 8. © 2014 KlugTech www.klugtech.com Data Management •  People and companies entrust sensitive data to others, but if
 data management is insecure… •  Recent breaches include some big-name companies •  So who can you trust?
  • 9. © 2014 KlugTech www.klugtech.com CRM •  Database driven marketing •  Stores all customer data, transactions •  Users can access all information, download, etc. •  Open to abuse © 2014 KlugTech www.klugtech.com
  • 10. © 2014 KlugTech www.klugtech.com Security Management •  Too trusting of people •  Rely on a single factor – Something you KNOW •  Intelligence is flawed •  Trust must be restored •  People have too much access to too much information, and have consistently proven themselves as a weak link. •  Over reliance on a password, which is required in full. Back up factors such as mother’s maiden name is also frequently asked, and too easy to get hold of. •  Machine intelligence is too easy to breach as it stands, and is therefore flawed.
  • 11. © 2014 KlugTech www.klugtech.com Riskiest Employee Practices 1.  Accessing the Internet via unsecured wireless networks 2.  Failing to delete unnecessary but confidential information from computers 3.  Sharing passwords with others 4.  Using the same username/ passwords 5.  Using generic portable drives without proper encryption 6.  Leaving computers unattended & unsecured 7.  Failing to notify firm after loss of portable drives 8.  Failing to shield screens/ data when working in insecure areas 9.  Carrying/accessing unnecessary sensitive information 10.  Using personal devices to access company networks © 2014 KlugTech www.klugtech.com
  • 12. © 2014 KlugTech www.klugtech.com Swiss Banks •  Trusted ‘secret-keepers’ for decades •  Accounts were ‘numbers’ •  No recorded mass breaches •  Still have a good reputation Banking secrecy was enshrined in Swiss law since 1934 – and only amended in 2004. It could be argued that the amended view is not yet fully complied with.
  • 13. © 2014 KlugTech www.klugtech.com Learn from the Secret-Keepers •  Have to KNOW your number •  Have to HAVE your key •  Have to HAVE some identity •  Have to KNOW which bank A single element was not enough… Why is it OK for the IT industry? © 2014 KlugTech www.klugtech.com
  • 14. © 2014 KlugTech www.klugtech.com Physical Security •  We can use a range of measures to keep people out, and/or away from sensitive data files and servers •  Why do all files need to be in one place (eggs & baskets!)? •  Why do individuals need access to ALL the information… ever? © 2014 KlugTech www.klugtech.com
  • 15. © 2014 KlugTech www.klugtech.com Security Example Would you leave your car… •  On the highway •  With the keys •  Unlocked •  With the registration documents Datacentres are often know, or signposted Physical access can be overcome – in datacentres, physical access needed be on site, it can also be via the internet Data is often in unencrypted files – encryption is only involved in the transfer process Data is often stored together – so usernames, passwords, personal data, etc., are all grouped together, so even a minor breach could provide a complete view of a customer or group of customers
  • 16. © 2014 KlugTech www.klugtech.com What’s Stopping You? •  Take security seriously •  Split up your databases •  Use encrypted, multi-point security •  Limit data access •  Keep parts of your system clean & free from all outside influences •  Work with your customers © 2014 KlugTech www.klugtech.com
  • 17. © 2014 KlugTech www.klugtech.com KlugTech •  KlugTech was created to address the usability and security of the Internet of Things •  We have created a modular approach to securing your systems, but a single, safe interface •  Domestic Solutions •  Enterprise Solutions •  Transport Solutions •  Healthcare Solutions •  Public Sector Solutions •  Smart Power Solutions •  Retail Solutions •  Delivery/Logistic Solutions •  Education Solutions •  Smart City Solutions •  Agricultural Solutions •  Security Solutions www.klugtech.com