

Internet of Things: cyber security by Deutsche Telekom
- Secure ID verification certificates from Telekom
- Fully automated ID management for the IoT
- Machines can be clearly identified
Worldwide, some 6.4 billion devices are connected to the network. By some estimates, this figure will climb to 25 billion by 2020. Whether a refrigerator or industrial robot: most things in life were never conceived to be available via the global network. As a result, they are often vulnerable to cyber attacks due to a lack of adequate protection. Deutsche Telekom is now making the Internet of Things, or IoT for short, more secure. It is introducing a new protective layer to the device network using certificates from the
Every "thing" has its own identity
The certification authority at
"The Internet of Things opens up the network to attacks by cyber criminals on a huge scale. Our IoT solution keeps the playing field as small as possible for attackers," says Ferri Abolhassan, Director of
The certification authority for the IoT uses cryptographic algorithms that incorporate the recommendations of the German Federal Office for Information Security, as well as innovations and industry standards. Frequent independent audits and certification processes maintain these high standards.
Ferri Abolhassan has given an interview on the issue of security in the Internet of Things (IoT) environment, which can be found here.
11 ways to stay safe in the Internet of Things (IoT):
- Give due attention to security right from the start: Upgrading later on is always difficult.
- Be aware of what is connected: Knowing exactly which devices are connected and how is essential to keeping them better protected and monitored.
- Don't think every last thing has to be connected: Be economical: Only link up what needs to be linked and is useful.
- Keep data communication down to the essentials: So devices on the network will only communicate under specific, predefined circumstances.
- Separate critical systems from non-critical systems: For example, don't connect industrial plant controllers with office communication networks.
- Create logical areas: Set up logical sub-divisions within the overall system to keep damage down to a minimum in the event of a successful attack.
- Use penetration tests: Check vulnerability beforehand to help prevent attacks before they happen.
- Keep software up to date: If all systems were updated on time worldwide, 95 percent of attacks could be prevented.
- Encrypt connections between things: Encrypt communication to stop information from being intercepted en route.
- Use certificates to verify the identity of all things: So only authorized individuals can access exactly the devices that need accessing.
- Use strong partners: Seek expert assistance in case of uncertainty and have an end-to-end protection concept drawn up by a company such as Deutsche Telekom.
About Deutsche Telekom
Deutsche Telekom is one of the world’s leading integrated telecommunications companies with more than 156 million mobile customers, 29 million fixed-network lines and around 18 million broadband lines (as of December 31, 2015). The Group provides fixed-network/broadband, mobile communications, Internet and Internet-based TV products and services for consumers, and ICT solutions for business customers and corporate customers. Deutsche Telekom is present in more than 50 countries and has around 225,200 employees worldwide. The Group generated revenues of 69.2 billion euros in the 2015 financial year – around 64 percent of it outside Germany.
About
Drawing on a global infrastructure of data centers and networks,