
Submitted for your approval, our effort to encapsulate a brief history of IoT, the scope of its impact, and the myriad problems facing those who are adopting it.
Where are IoT devices used? When was the first programmable logic controller created? When did IoT and IT first interact? You’ll find it all here along with facts and figures that document:
Is the growth rate of IoT vulnerabilities and threats to devices keeping pace with the overall growth of IoT devices globally? Sadly, yes, as we illustrate here.
You’re welcome to use this in your own efforts to communicate the security issues associated with the Internet of Things, and if there is anything we can do to help, please don’t hesitate to ask.
Where are IoT devices used? When was the first programmable logic controller created? When did IoT and IT first interact? You’ll find it all here along with facts and figures that document:
- The first malware that targeted IoT devices
- A timeline of major threats to IoT devices
- The top vulnerabilities found in IoT devices
Is the growth rate of IoT vulnerabilities and threats to devices keeping pace with the overall growth of IoT devices globally? Sadly, yes, as we illustrate here.
You’re welcome to use this in your own efforts to communicate the security issues associated with the Internet of Things, and if there is anything we can do to help, please don’t hesitate to ask.