According to Survey, IoT Use is Up While Trust is Down

According to Survey, IoT Use is Up While Trust is Down

While the Internet of Things has increased in use, that doesn’t mean that its users necessarily trust it just yet. Furthermore, many of these users aren’t fully aware of the actual extent that the IoT has in their lives. These results, from a recent survey by Cisco, could be pertinent to your business and how you manage it. With so many new devices connecting to your network, how can you expect them to affect operations?

Cisco’s survey covers 3,000 North American adults with at least some knowledge of IoT devices. As such, it provides a lot of great information about how businesses and consumers respond to the Internet of Things. Most consumers aren’t necessarily aware of just how far-reaching the Internet of Things can be, even if they use them on a regular basis. In fact, the Internet of Things includes devices that might not have traditionally benefited from a connection to the Internet. Some of these are car navigation systems, street lamps, security systems, and health-monitoring devices.

Most users knew about some of the more familiar and useful Internet of Things devices, but others were amazed by some of the more unusual IoT devices out there. Even though there are disparities in awareness, users generally responded positively to Internet-connected devices, provided they knowingly used them. 53 percent of users claimed that connected devices provided an easier way of life, while 47 percent found that their lives were more efficient with them. 34 percent of users also argue that Internet of Things devices have made them feel more secure.

However, the real kicker of this survey is that only 9 percent of respondents could say that they felt their data was more secure or private thanks to the Internet of Things. Furthermore, 14% of users felt that the way their data was being used wasn’t transparent enough for their liking, which is certainly a major concern. Even if the device helps you, you still have to worry whether or not it’s compromising your security.

Despite these suspicions, it’s likely that the Internet of Things is going to continue growing. Therefore, you must make sure that your company is taking IoT devices into account around your office. Implementing a Bring Your Own Device (BYOD) strategy is the best way to make sure that your business is always aware of devices found on the company network. Implementing such a policy ensures that your business has a plan for personal devices in the workplace, and it can help to limit the damage done by them in the event of an incident.

Celera Networks can help your business prepare for the Internet of Things. To learn more, reach out to us at (617) 375-9100.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 25 February 2018

Captcha Image

Request a Free Consultation

  • Company name *
  • First Name *
  • Last Name *
  • Title
  • Phone
  • What are your concerns?

      Sign up for our Newsletter!

      • Company *
      • First Name *
      • Last Name *

          Mobile? Grab this Article!

          QR-Code dieser Seite

          Tag Cloud

          security Tip of the Week technology Hackers Privacy Best Practices Cloud Productivity Business Computing business Malware Microsoft Internet IT Services Backup Hosted Solutions Managed Service Provider IT Support Email Network Mobile Devices Workplace Tips Communication Hardware Computer Smartphones Disaster Recovery Mobile Device Management Microsoft Office Holiday Windows Miscellaneous network security Business Continuity Small Business Windows 10 Efficiency Data Server Software Alert Smartphone Google Business Management Internet of Things Virtualization User Tips Upgrade Saving Money Social Media WiFi Remote Monitoring Innovation Ransomware Big Data Android BYOD Passwords Gmail Remote Computing Cybersecurity Operating System VoIP Office Browser Vendor Management Apple Spam Mobile Computing The Internet of Things Apps App Business Growth Facebook Risk Management Budget Hacking Analytics Information Technology Artificial Intelligence Collaboration Wireless Technology Phishing Customer Service Automation Gadgets Office 365 Managed IT Services Cybercrime Money Hacker IT Solutions Robot Cost Management Outsourced IT Retail Best Practice Office Tips Save Money Tech Support Bring Your Own Device Going Green Data Management Mobile Device Social Engineering Hosted Solution Bitcoin Outlook IT service Proactive IT Current Events Application intranet communications Avoiding Downtime Data storage Recovery Presentation Content Filtering Firewall Downtime Hard Drives Maintenance Cortana Lithium-ion Battery Running Cable Customer Relationship Management virus Employer-Employee Relationship IT Consultant Saving Time End of Support Computers Laptop Managed IT Health Document Management Company Culture PowerPoint IT Support Administration Cryptocurrency Samsung Productivity Statistics Password Antivirus Save Time iPhone Google Docs Two-factor Authentication Blockchain Hacks Augmented Reality Vulnerabilities Excel Work/Life Balance Net Neutrality Hiring/Firing Tablet Update Social Law Enforcement Business Owner Private Cloud LiFi Competition eWaste Search Cloud Computing Humor Marketing Trending Education Analyitcs Safety Network Congestion Data Security Mobile Technology Mouse Twitter Programming Windows 8 Encryption Specifications project management User Disaster Website Wireless Data Breach Settings Phone System Piracy Bandwidth Chrome USB Quick Tips VPN Virtual Desktop Public Speaking Fake News Websites Printer Help Desk Documents 5G Business Intelligence Fraud Windows 8.1 Update data breaches Television Google Drive Crowdsourcing Halloween Digital Signature Heating/Cooling Migration IBM Microsoft Excel Botnet Managed IT Services today ’s world Printer Server Virtual Reality PDF email scam Crowdfunding risk Cyber-attacks Government Scary Stories Business Technology Users experience downtime Co-managed IT cyberattack SharePoint Sports Compliance Desktop Tip of the week Unified Communications Printing Fun Computing Infrastructure Travel cyberattacks Distributed Denial of Service Storage Regulations Digital Computer Repair Data loss Paperless Office Computing Entrepreneur Vulnerability businesses Router Debate Evernote Dark Data Gadget Buisness Refrigeration Consumers IP Address Virtual Assistant Skype IT Management Deep Learning Google Wallet Knowledge Networking Memory Software as a Service Data Warehousing Politics CIO Mobile Office Touchscreen Hard Drive LinkedIn Public Cloud Google Calendar Technology Tips Drones Black Market Environment Experience Business Cards Identity Theft Windows Server 2008 Telephony User Error Best Available Access Control Identities security breach Troubleshooting History Software License People Windows 7 Training Undo Modern technology Hard Drive Disposal Video Surveillance Solid State Drive Mobile Payment Backups Processors Display Word Redundancy Licensing Mobility Freedom of Information File Sharing YouTube Alt Codes business owners Unified Threat Management Patch Management Legal Notifications Monitors Data Recovery Online Currency Managed Service Providers Domains News Files Flexibility Typing Wi-Fi Fiber-Optic Downloads Comparison Telephone Systems bdr Writing IT Plan IT Budget CCTV Digital Payment G Suite Point of Sale Google Maps Machine Learning Corporate Profile SaaS Unified Threat Management Meetings Software Tips Relocation WannaCry Physical Security Webcam Applications Chromebook Motion Sickness GPS Data Backup How To Mobile Security Error Personal Information Emoji Cleaning Tracking Upgrades Electronic Medical Records Computer Care Cabling 3D Printing Automobile Staffing Infrastructure Unsupported Software test post Administrator Taxes Uninterrupted Power Supply Mobile Data Sync Web Server Supercomputer Hard Disk Drive Mobile Device Managment Cameras