Blog Archive

Please visit our current blog

TempAlert Blog

3 Steps to IoT Peace of Mind

Jul 15, 2016

IoT peace of mind

Businesses are rapidly adopting IoT technologies and their IT departments are desperately trying to keep up, potentially creating security risks if they are not implemented properly. One prominent IoT technology is smart sensors. These devices are used to monitor a multitude of things including, security, motion, light, and temperature. Smart sensors can be deployed by the thousands and each are a potential portal into business’ IT network. While nothing is hack-proof, here are five steps to make an intrusion into your network less likely.

1. Independent Network

The recommended Sensing-as-a-Service strategy is to have smart sensor networks be independent of enterprise networks. This practice has been used successfully by national healthcare, retail, and pharmaceutical chains to prevent intrusion.

2. Robust Encryption

Wireless sensors can communicate to a gateway via mesh or star networks. Using 128 bit encrypted IEEE 802.15.4 type sensors to transmit data, combined with a secure, encrypted cellular network offers a high-level of protection from intrusion. This strategy eliminates direct connections between the sensor network and the enterprise network.

3. Role-based User Credentials

A well-planned and implemented role-based user matrix enables companies to maintain security and information access. This strategy prevents lower-level users from having access to sensitive information or pathways into the enterprise network.

TempAlert role-based security matrix

TempAlert’s Role-based User Matrix requires proper credentials for access to critical data.


Subscribe to the Connected Insights Blog

Get our latest updates every week!

This website uses cookies that are essential to the operation of this site, to personalize content and allow us to analyze site performance. If you continue to use our website, you consent to the use of our cookies. Click OK to indicate your acceptance of our cookie policy, including advertising cookies, analytics cookies, and sharing of information with social media, advertising and analytics partners.

Learn more >