Blog

IoT and the Workplace: 5 Things to Consider

November 7, 2014

shutterstock_201256211When looking at technology over the last few decades, it's impressive to see how far computing has come and inspiring to consider where it’s going. As hardware has gotten smaller and the cloud has enveloped most of the data in the civilized world, the Next Big Thing has now arrived and is known as the Internet of Things (IoT).

Think of how the personal technology landscape has grown just over the past two years, with the advent of smart watches, refrigerators, TVs, home thermostats, and lights that are controlled via smartphone. With all of the consumer devices built for efficiency and convenience, innovation in the business environment is certain.

And, as with any new technology, there is much for IT departments to consider when integrating IoT into the workplace.

1.  Storage Needs

Any device connected to the Internet will create data of some sort, and there must be somewhere for this data to be stored. Whether in the cloud or on a hard drive, it’s possible for data to consume gigabytes and terabytes of storage space.

2.  Security

Perhaps the most important for IT experts is the seemingly endless number of access points that could be possible spots of vulnerability. Each of these points may allow access to the network, which means each point is also connected to confidential business information, customer and employee records, contracts, formulas, patents, and other unguarded items found in email or on shared drives. IT must keep in mind that, if given the opportunity, hackers can exploit network holes quickly and easily.

3.  Cross Compatibility

Not all devices will communicate at the same level of quality or understand the data created by opposing devices. Different devices also connect via different methods and may cause system conflicts. Coordinating communication across multiple device platforms can be time-consuming and labor intensive, especially when debugging is necessary.

4.  Adequate BYOD Policies

Workplaces that offer the opportunity to Bring Your Own Device (BYOD) can open doors to risk. A growing organization must protect itself with policies that regulate use and mandate certain security preparations, especially with the sophisticated social engineering and phishing tactics currently employed by hackers.

5.  The IoT Is Endless

It seems that just about anything can be computerized these days. If each mechanical system (think electronic trash cans, appliances, office equipment, elevators, and more) could eventually connect to the Internet, they must also all allow upgrading, security patches, and an adequate capacity for connection points. Nearly anything could potentially fall into the realm of IT, or at least require some small degree of attention from that department. In addition to placing a strain on resources and systems,it could add complexity to systems administration. Ultimately this translates to the need for better project planning, effective systems monitoring, and constant vigilance.

The time will come when all systems and devices will be simply and seamlessly connected. As with all inventions throughout history, it will be difficult to imagine life before this wonderland of connectivity and communication. As that not-so-distant point approaches, IT must be prepared to accommodate this vast new world with adequate resources, flexibility, and knowledge.

 

 

RECENT POSTS
ARCHIVES

CATEGORIES