Remember your first smart phone? Your first home automation device? What about the first time you used mobile banking?
If you’re like most people, it was both exciting and a little scary to test the waters of these new technologies. Over time, however, advanced technologies have become second nature. In fact, they’ve helped make everyday life easier, better, and more efficient.
Thankfully, worker health and safety has caught up with the technological revolution. After being left in the dark for far too long, connectivity for safety is here, and here to stay.
There is, however, a “dark side” to living and working in a connected world; namely, breaches, hacks, and cyberattacks.
Cybersecurity issues are real, prevalent, and growing. In fact, recent reports show that 2020 went down in the record books for the sheer amount of lost data and number of cyberattacks.1
For safety, the news is even more alarming. There is a growing number of attacks on connected devices and equipment known as Internet of Things or Iot.2
For Safety Managers, this is a wake-up call.
That’s because Industrial IoT (IIoT) devices, including portable gas detectors, are at risk for attack by cybercriminals.
Cybersecurity and Your Gas Detection Fleet
What, you may be wondering, could cyberthieves possibly gain from hacking our portable gas detection fleet?
You’d be surprised.
Cybercriminals are bent on causing disruption and destruction. Not only do gas detectors contain sensitive information, such as worker location, a connected fleet could potentially allow entry into your network system – and worse.
That’s why cybersecurity matters.
Proper layers of protection allow you to reap the many benefits of a connected gas detection program and give you peace of mind about your SaaS (Software-as-a-Service) solution.
Data Protection and Security
Anytime a device, instrument, or piece of equipment is connected to the internet, your network, or the cloud, security issues and vulnerabilities are a possibility. No device – whether a mobile phone, a smart home thermostat, or a portable gas detector – is 100% immune to attack.
Here’s a look at the top two things that can go wrong in the absence of cybersecurity measures:
If a device is not properly secured, it has the possibility of being reached through the internet. Cybercriminals can use this opening to infect an entire network with a type of malicious software known as ransomware. Once infected, cybercriminals will not restore access unless and until a ransom is paid. Experts predict that worldwide ransomware incidents will exceed $265 billion annually in the next 10 years.3
Depending on your industry and where you are located, regulatory agencies and governing bodies have the right to assess sizeable fines for data breaches. From the California Consumer Privacy Act (CCPA) in the U.S. to the General Data Protection Regulation (GDPR) in the European Union, failure to enact data privacy measures have the potential to cost your organization thousands or even the millions. 4,5
This information is not intended to scare you. It is, however, meant to raise your awareness of the importance and urgency to enact secure connected solutions.
Again, cybersecurity matters to everyone, including Safety Managers.
A Checklist: What to Look for in a Connected Worker Solution
Keep in mind that the pros of connectivity far outweigh the cons, but only if you are prepared with the right cybersecurity measures.
To see if your proposed or current SaaS solution stacks up to what’s needed to ensure adequate and compliant cybersecurity to support worker and worksite safety without compromise, use this checklist. Answer “yes” for statements that are true and “no” for statements that are not.
- ISO/IEC 27001:2013 Certified: Is your proposed or current SaaS solution certified by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), guaranteeing both data protection and network security?
- Access Controls and Authentication: Does it use industry-standard password policies and require verified user authentication?
- Annual Penetration Testing: Does the solutions provider require annual third-party vulnerability tests on all its applications, infrastructure, and APIs?
- Backups and Recovery: How often does the provider run backups? Are the backups encrypted? Does the provider perform a daily backup restoration test?
- Data Access and Usage: Is system and data access restricted by an advanced set of encryption and logging features?
- Data Storage: Are the provider’s services and infrastructure hosted in a secure data center, such as the industry-leading Amazon Web Services (AWS)?
- Encryption in Rest: Is data stored in an encrypted format using AES-256-bit encryption?
- Encryption in Transit: Does the solution require HTTPS and Transport Layer Security over public networks, encrypting communications to ensure that nothing can be read or manipulated by unauthorized users?
- Incident Response Plan: Is there a comprehensive incident response plan for suspected and actual incidents?
- Organizational Security Measures: Does the provider maintain policies and procedures that align with ISO/IEC certification standards?
- Personnel Security Measures: Does the provider conduct background checks, employ confidentiality agreements, and require employees to undergo regular and rigorous security and privacy training?
- Secure Software Development: Does the provider avoid the use of data for testing purposes? Does the provider require the use of fully isolated environments for testing, staging, and production?
So how many “yes” answers did your current or proposed solution get? Better yet, how confident are you in the security and protection of your connected solution? Or are you planning to remain disconnected in hopes of avoiding cyberattacks? (Remember, hope is never an effective strategy.)
No matter what your answer, it’s critical to be absolutely certain that you are doing all you can to safeguard your workers, worksites, and connected devices with the best, most secure connected solution.
Download our whitepaper on cybersecurity below.