The Internet of Things (IoT), in which all manner of devices and things are connected, is enabling digital transformation in many walks of life. It’s also heralding the promise that we will soon live in hyperefficient smart cities. But how does this affect business?

A recent report from The Economist Intelligence Unit (EIU) gauged the current IoT impact on business in comparison to similar research the firm conducted in 2013. The study looked at how businesses are deploying IoT, the perceived barriers to deployment and the expected consequences for organizations.

How Does the IoT Impact Business?

According to the report, one-fifth of respondents have already seen the IoT impact their business, and 30 percent believe they will see these effects in the near future. Among the cited benefits of IoT are cost reductions, efficiency gains and new insights that enable innovation and new revenue opportunities. So far, the IT, financial services and retail industries are making the most progress when it comes to using IoT technologies for external products and services, rather than just internal projects.

The report also provided some specific examples from businesses that are harnessing the transformative power of IoT technologies. Facilities management firm ISS, for example, is collecting data from sensors embedded into the buildings it manages to analyze occupant behavior and drive greater efficiencies. However, other parts of the construction, real estate and facilities management sectors are lagging in their use of these technologies, despite the potential benefits.

In the automotive sector, connected cars are fast becoming reality, enhancing both the driving and ownership experience. For auto company Daimler, the IoT is triggering a revolution in car ownership and usage. The company believes connectivity can enable people to share cars by remotely monitoring and managing their use, so available cars can be matched to demand. It sees the IoT as they key to its transformation from a car company to a mobility company.

Meanwhile, in the health care sector, the IoT can facilitate connected care networks that link patients, doctors and clinical physicians. This in turn can expand to the entire ecosystem of patients, customers, partners and suppliers. One medical equipment manufacturer is looking beyond just creating connected devices: The IoT enables it to participate in an interoperable ecosystem where equipment and services from many organizations work seamlessly together. Huge volumes of the resulting health care data can then be stored and analyzed in the cloud to improve efficiency and patient care.

The Sky Is the Limit

While many agree that IoT technologies offer transformative opportunities, respondents to the EIU survey reported some potential obstacles. Fifty-six percent of respondents stated that their deployment of IoT technologies had not been as fast as they expected three years ago. Additionally, their greatest concerns are related to practical matters, including the high cost required to invest in IoT infrastructure, and issues surrounding security and privacy.

Respondents acknowledged the importance of senior executive support for IoT investments in overcoming these barriers. However, 50 percent reported that their IoT efforts have this required backing, which bodes well for the future and their ability to cash in on the benefits offered.

We may not be able to asses the true IoT impact on business until adoption becomes more widespread, but judging by the small sample size we’ve observed so far, the sky is the limit for the IoT’s transformative potential.

Listen to the podcast: 5 Indisputable facts about IOT security

More from Endpoint

X-Force Prevents Zero Day from Going Anywhere

This blog was made possible through contributions from Fred Chidsey and Joseph Lozowski. The X-Force Vulnerability and Exploit Database shows that the number of zero days being released each year is on the rise, but X-Force has observed that only a few of these zero days are rapidly adopted by cyber criminals each year. While every zero day is important and organizations should still devote efforts to patching zero days once a patch is released, there are characteristics of certain…

Patch Tuesday -> Exploit Wednesday: Pwning Windows Ancillary Function Driver for WinSock (afd.sys) in 24 Hours

‘Patch Tuesday, Exploit Wednesday’ is an old hacker adage that refers to the weaponization of vulnerabilities the day after monthly security patches become publicly available. As security improves and exploit mitigations become more sophisticated, the amount of research and development required to craft a weaponized exploit has increased. This is especially relevant for memory corruption vulnerabilities.Figure 1 — Exploitation timelineHowever, with the addition of new features (and memory-unsafe C code) in the Windows 11 kernel, ripe new attack surfaces can…

When the Absence of Noise Becomes Signal: Defensive Considerations for Lazarus FudModule

In February 2023, X-Force posted a blog entitled “Direct Kernel Object Manipulation (DKOM) Attacks on ETW Providers” that details the capabilities of a sample attributed to the Lazarus group leveraged to impair visibility of the malware’s operations. This blog will not rehash analysis of the Lazarus malware sample or Event Tracing for Windows (ETW) as that has been previously covered in the X-Force blog post. This blog will focus on highlighting the opportunities for detection of the FudModule within the…

Cybersecurity in the Next-Generation Space Age, Pt. 3: Securing the New Space

View Part 1, Introduction to New Space, and Part 2, Cybersecurity Threats in New Space, in this series. As we see in the previous article of this series discussing the cybersecurity threats in the New Space, space technology is advancing at an unprecedented rate — with new technologies being launched into orbit at an increasingly rapid pace. The need to ensure the security and safety of these technologies has never been more pressing. So, let’s discover a range of measures…