ARTIKEL — January 12, 2022

What to do when 98% of IoT Traffic is Unencrypted

IoT Traffic is Unencrypted

98 percent of IoT Traffic is unencrypted, according to  Palo Alto networks in the Unit 42 2020 Threat Report. That is the shocking reality most businesses are operating in. No wonder data breaches are increasing every year. In United States alone, data breach rate went up 27% in 2021 compared to 2020.

These pockets of unencrypted data are where attackers can easily slip in and hack into devices, networks, and all the data in the business. It is called the Man in The Middle (MiTM) attack.

Despite this, IoT is still growing at a high rate. If the trend continues, businesses will be in deep trouble. A change needs to be made.

Telkomsel IoT recently launched a new network security solution: Telkomsel IoT Sphere.

IoT Sphere can be applied to various systems and devices as long as it uses Telkomsel IoT’s SIM card. It works by completely monitoring and guarding the system, checking for malwares and other forms of digital attacks. 

For instance, when your EDC uses Telkomsel IoT’s SIM card, every transaction will be inspected by IoT Sphere. It will check the data pathway for malware based on its comprehensive and always-updated database. If a malware is detected, Sphere will immediately kick it off and clean the pathway before it ever gets to the server. So, every transaction that reaches the banking server is clean traffic. Additionally, having clean traffic going through your network means your bandwidth is optimally used therefore increasing your quality of service.

Alfian Manullang, Vice President of Internet of Things Telkomsel mentioned, “(IoT Sphere’s) mechanism is practical because it is equipped with a mitigation system that can detect threats automatically and in real-time.” This prevents zero-day attacks from happening to your business. 

IoT Sphere has features like Just on Click, Security and Threats Protection, Device Agnostic, also Routing and Filtering. 

Just on Click made the platform easily configured. It gives data visualization on detailed reports of real-time conditions. 

Security and Threats Protection is the comprehensive database of all known malwares and viruses in the world. It will automatically update itself if a new malware comes to light. Therefore your system is always protected even from the latest form of attacks.

Device Agnostic feature allows the platform to be applied to all devices and applications. It also has End Device Protection for non-intrusive monitoring.

Lastly, Routing and Filtering gives users the flexibility to configure their data connectivity with comprehensive segmentation and a strong filtering system. This filtering system will ensure that only known users with authentication can access certain data which lessens fraud and unwanted access.

If you’re unsure of the data encryption on your current IoT devices, contact our IoT Experts immediately and start securing your network. You’ll gain a peace of mind from knowing that the vast variety of attacks is no longer a concern. Take your business performance and productivity further by securing your business network with IoT Sphere. Find out more about IoT Sphere right here.

NEWS — Jun 21, 2021
The B2B segment that will gain the most value from 5G IoT

In 2030, almost 50% of 5G application sales are predicted to co

READ MORE >>
NEWS — Mar 11, 2019
Are You Doing Enough to Protect Your IoT Driven Company?

IoT is paramount for business growth. New devices and solutions

READ MORE >>
Industrial IoT
NEWS — Jul 15, 2020
Industrial IoT

Industrial IoT becomes the driving force behind increased innov

READ MORE >>
IoT Sectors with 5G
NEWS — May 17, 2021
Boosting Productivity in Indonesia’s Main IoT Sectors with 5G

Learn how banking, government, and education in Indonesia can b

READ MORE >>
The Benefits of Securing IoT
NEWS — Feb 24, 2020
The Benefits of Securing IoT for Utility Companies During Unpredictable Weather

Bad weather has its own impact on utility providers in Indonesi

READ MORE >>
The Significance of Workforce
NEWS — Sep 27, 2021
The Significance of Workforce Training to Ensure a High-Class IoT Based Company

In the fast-paced technology and work changes, how does the com

READ MORE >>
NEWS — Sep 28, 2022
Tingkatkan Kualitas Pengiriman dan Penanganan Makanan Segar Anda

Teknologi IoT dapat menjawab kebutuhan supply chain dengan cara

READ MORE >>
How C2M Model
NEWS — May 24, 2021
How C2M Model Can Improve Manufacturing Business

Learn how consumer to manufacturer (C2M) interaction can improv

READ MORE >>