ARTICLES — January 12, 2022

What to do when 98% of IoT Traffic is Unencrypted

IoT Traffic is Unencrypted

98 percent of IoT Traffic is unencrypted, according to  Palo Alto networks in the Unit 42 2020 Threat Report. That is the shocking reality most businesses are operating in. No wonder data breaches are increasing every year. In United States alone, data breach rate went up 27% in 2021 compared to 2020.

These pockets of unencrypted data are where attackers can easily slip in and hack into devices, networks, and all the data in the business. It is called the Man in The Middle (MiTM) attack.

Despite this, IoT is still growing at a high rate. If the trend continues, businesses will be in deep trouble. A change needs to be made.

Telkomsel IoT recently launched a new network security solution: Telkomsel IoT Sphere.

IoT Sphere can be applied to various systems and devices as long as it uses Telkomsel IoT’s SIM card. It works by completely monitoring and guarding the system, checking for malwares and other forms of digital attacks. 

For instance, when your EDC uses Telkomsel IoT’s SIM card, every transaction will be inspected by IoT Sphere. It will check the data pathway for malware based on its comprehensive and always-updated database. If a malware is detected, Sphere will immediately kick it off and clean the pathway before it ever gets to the server. So, every transaction that reaches the banking server is clean traffic. Additionally, having clean traffic going through your network means your bandwidth is optimally used therefore increasing your quality of service.

Alfian Manullang, Vice President of Internet of Things Telkomsel mentioned, “(IoT Sphere’s) mechanism is practical because it is equipped with a mitigation system that can detect threats automatically and in real-time.” This prevents zero-day attacks from happening to your business. 

IoT Sphere has features like Just on Click, Security and Threats Protection, Device Agnostic, also Routing and Filtering. 

Just on Click made the platform easily configured. It gives data visualization on detailed reports of real-time conditions. 

Security and Threats Protection is the comprehensive database of all known malwares and viruses in the world. It will automatically update itself if a new malware comes to light. Therefore your system is always protected even from the latest form of attacks.

Device Agnostic feature allows the platform to be applied to all devices and applications. It also has End Device Protection for non-intrusive monitoring.

Lastly, Routing and Filtering gives users the flexibility to configure their data connectivity with comprehensive segmentation and a strong filtering system. This filtering system will ensure that only known users with authentication can access certain data which lessens fraud and unwanted access.

If you’re unsure of the data encryption on your current IoT devices, contact our IoT Experts immediately and start securing your network. You’ll gain a peace of mind from knowing that the vast variety of attacks is no longer a concern. Take your business performance and productivity further by securing your business network with IoT Sphere. Find out more about IoT Sphere right here.

NEWS — Aug 30, 2021
How to Create Value from Your Manufacturing Data

Is your factory struggling creating value from your smart devic

READ MORE >>
Digital Transformation
NEWS — Oct 08, 2021
Top Business Rationale for Digital Transformation

With the unexpected and big shock of Covid-19 pandemic, digitiz

READ MORE >>
NEWS — Sep 10, 2019
From Point A to B, Right on Time: 3 Ways IoT Can Improve Your Fleet’s Movement

We have reached the time where the transportation industry goes

READ MORE >>
RPA Tools for Your Business
NEWS — Apr 23, 2021
The Guide to Choosing the Right RPA Tools for Your Business

By implementing the RPA tools that suit your needs, you can eas

READ MORE >>
The Importance of Data
NEWS — Feb 11, 2022
The Importance of Data For Maintenance

Processing the accurate data is important for the maintenance o

READ MORE >>
Pent-Up Demand Preparation
NEWS — Jun 09, 2020
Keeping in Touch with Customers as a Pent-Up Demand Preparation

Careful planning is useful for preparing your business for pent

READ MORE >>
NEWS — Aug 15, 2022
The 3 Companies Doing Data-Driven Decision Making

Decision making is one of the important actions that leaders ha

READ MORE >>
IoT Analytics
NEWS — Feb 10, 2021
IoT Analytics: How the Right Solution Can Decide Your Business’ Future

Big Data is the core that powers the IoT, but its value comes f

READ MORE >>