SMB Nation Blog

SMB Nation has been serving the Bainbridge Island area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Connected Devices, Remote Security: Data Encryption and Security in the Cloud

By Pete Johnson


Security” used to mean worrying about HTTPS certificates on your websites. The notion of a “device” was a browser and all you really had to do was to guarantee that traffic between it and your web servers was encrypted.

Then the “bring your own device” (BYOD) phenomenon caused system administrators to worry about things like isolating WiFi traffic for visitors and providing VPN tunneling software of iOS and Android, so that employees could access corporate assets in the palms of their hands. “Device” then meant “smartphone.”

But now, “device” means something different. Manufacturing equipment, plane engines and even parking meters all qualify. Devices seem to outnumber people, reminding us why we need IPv6. But this new notion of “device” also requires a very different security model unless you want to fall victim to a hacker because you forgot to secure every thermostat in your building.

Building Multiple Security Levels on top of HTTPS
Different vendors address this more complex security model in different ways, but generally speaking, it has three components to it: Authorization Engine, Handshake Certificates and HTTPS.

HTTPS is still the underlying technology for encrypting traffic, but unlike the old days of web surfing (when we used to argue about the length of the keys), modern device traffic puts two layers on top of that base encryption. First, there is a set of certificate handshakes that makes sure that some cloud entity should be talking to the device in question. On top of that is typically a cloud-driven authorization engine that can confirm or deny specific instructions to the device.

Read More

What’s new in Microsoft’s Visual Studio 2017
10 Best Google Analytics Tools for Your Business

Recent Comments

Mili The Fastest Way To Create A New Managed Security Service
20 September 2018
In today's business world, security plays an important role. A businessman considers that it is impo...
Mili Small Businesses Move Fast–Don’t Get Left Behind
20 September 2018
Small businesses can move fast if they have the drive to succeed and have a bigger goal than good pr...
Mili New Spring Conference Content – Bucket List!
20 September 2018
In today's business world many technological innovations are necessary to create a better communicat...