It was the winter Olympics that got me thinking. What does it take to be a leader? What are the traits? Although leaders are usually individuals – could those human attributes be translated onto a company?
We live in an always connected world. So much so that in The Netherlands they’ve put the red ‘don’t walk’ light on the groundas people are so engrossed looking down at their mobile device. If you ask how wireless connectivity can be improved: it’s faster download, quicker response and more reliable connection. According to its promise 5G will deliver all that and more! Great news for consumers. But will it be the cybercriminals who are real winners?
Cable companies, pay TV operators and telcos are often called service providers for the principal reason that they are not selling media and entertainment – they are selling a service. One of the most valuable assets they hold is a direct physical link into people’s homes and an ongoing monthly billing relationship.
From a pure business perspective that means anything a service provider can leverage to boost bandwidth usage and ARPU is fair game.
A group of U.S. senators recently introduced a new bill (the ‘‘Internet of Things (IoT) Cybersecurity Improvement Act of 2017’’) to address security vulnerabilities in connected devices. While this is a positive step toward improving baseline security for all devices bought and used by the government, it magnifies a much larger issue that is prevalent today in industries that are increasing their product’s connectivity to the Internet. Let me explain…
Could an innocent device like a STB, webcam or home thermostat be used by hackers to attack you? In the current world of the Internet of Things (IoT), the answer is Yes! Leading to the name Internet of Threats. But operators have the power to change this.
IoT promises connected convenience at consumer’s fingertips. From adjusting your home heating when you land back at the airport, to checking your home security remotely if the alarm goes off while you’re out. Consumers depend on their operator to be the trusted party and remove any privacy or security implications.