MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

People May Not Trust the IoT, But They Still Use It

People May Not Trust the IoT, But They Still Use It

Connectivity is one of the major benefits of mobile technology, but some developments have taken this aspect to crazy (and borderline ridiculous) heights. The Internet of Things is forcing businesses to rethink the conventions of connectivity in ways which previously weren’t particularly necessary. Unsurprisingly, the Internet of Things is forcing business owners and normal users alike to remain skeptical of connected technology to a certain degree, and a survey from Cisco showcases this trend perfectly.

Cisco’s survey covered 3000 North American adults who had a passing familiarity with IoT devices, providing invaluable data to both business-to-consumer and business-to-business organizations. Generally speaking, most consumers aren’t aware of just how far-reaching the Internet of Things can be. The Internet of Things encompasses all devices that have some sort of connection to the Internet, even devices that traditionally haven’t been able to take advantage of this connectivity. Some great examples include car navigation systems, street lamps, home security systems, and even health monitoring devices like pacemakers.

While the majority of users were familiar with some of the more conventional Internet of Things devices, they had no clue that some of the stranger IoT devices could boast such connectivity. Despite this considerable difference in awareness, those who knowingly use IoT devices have had a positive response to it. 53% of respondents claim that connected devices have made their lives easier, while 47% of respondents claim that they have made their lives more efficient through connected devices. Even 34% of personal connected devices have made users feel more safe, which is valuable in and of itself.

Despite these impressive numbers, only 9% of respondents claimed that their data felt more secure or private. Furthermore, only 14% of users felt that their vendors were transparent about how the information collected by these devices is used. It just goes to show that just because a device helps you, that device may not necessarily make you feel safe and secure.

Even with these suspicions, it’s probable that the Internet of Things will continue to grow, which means that your organization needs to start accounting for these devices both in and around your office. If you think about it, your employees will likely be bringing multiple devices with them to the office in the first place, so you need to have policies put into place to ensure that data security isn’t sacrificed just for the privilege of bringing personal devices into the office. A Bring Your Own Device policy can go a long way toward limiting which connected devices have influence over your company’s network.

Do you have any questions about how the Internet of Things and connected mobile devices can influence your business? MERIT Solutions can help. To learn more, reach out to us at (757) 420-5150.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 21 May 2018

Captcha Image

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Privacy Business Computing Network Security Hackers Malware Software Internet Hosted Solutions Backup google Productivity Business Management Managed IT Services Mobile Devices Microsoft Disaster Recovery VoIP Computer Business IT Support communications Outsourced IT Business Continuity Cybersecurity Windows 10 Email User Tips Hardware Innovation Productivity IT Services Cybercrime Data Backup Efficiency Windows Saving Money Mobility Mobile Device Management Managed IT Server Ransomware Small Business Apps Operating System browser Data Law Enforcement Internet of Things Data Recovery Smartphone Tech Term Android Virtualization Telephone Systems Save Money Smartphones Phishing Hosted Solution Quick Tips Passwords Data Security BDR Money Cloud Computing Recovery Communication VPN Microsoft Office Office 365 BYOD Automation Password Holiday Information Technology Chrome Vulnerability Data Management App Work/Life Balance Cost Management Network Wi-Fi Data Breach Facebook Government Google Drive Hacking Avoiding Downtime Alert Update Two-factor Authentication Health Gadgets Miscellaneous Wireless Managed Service Provider Computers Collaboration IT Support Risk Management Unsupported Software Best Practice Social Media upgrade Social Budget Shortcut search Employer-Employee Relationship Spam Firewall Managed IT Services Application Antivirus User Error Current Events Audit Wireless Technology Personal Information Telephony Politics Workplace Tips Cleaning USB Office tips Data Protection Applications Private Cloud Save Time History Proactive IT Social Engineering Streaming Media Identity Theft The Internet of Things Windows 10 Flexibility Going Green Devices Bandwidth eWaste Wireless Charging Excel Sports SaaS Data Storage Tech Support Fraud Samsung Content Filtering Hacker OneNote Internet Exlporer Battery Solid State Drive HaaS Compliance Gmail Data Loss iPhone Marketing Project Management Automobile Mobile Computing Value Google Docs Transportation IT solutions Saving Time Robot DDoS Office Phone System Computer Care Remote Computing End of Support Redundancy Television Legal Commerce Users Encryption Blockchain Apple Cortana Artificial Intelligence Patch Management Humor Disaster WiFi Mobile Security Big Data Business Intelligence Data storage Touchscreen Printing Managing Stress Lifestyle Charger Outlook IoT Identity Books remote Scalability Word Administration Chromecast Managed IT Service Google Assistant Hiring/Firing Spyware Yahoo Education Legislation Router iOS Vendor Management Language Data Privacy Running Cable Server 2008 How To Windows Ink Colocation Computer Forensics Benefits Ali Rowghani Comparison Hard Drives Evernote Regulation Computer Fan Files Trending Unified Threat Management Hard Drive Lithium-ion battery Google Maps Administrator Screen Mirroring Edge Specifications Entertainment Networking Sync Dark Web Training Virus Upgrades Chromebook Electronic Medical Records server installation dvd "cannot install required files" Software as a Service Relocation Meetings Access Cast Emails Ciminal stock Point of Sale Sales HIPAA Workers Adobe Company Culture Proactive Consultant Smart Tech Safety Black Market Settings Smart Technology tweet Retail PDF Updates Avoid Downtime Licensing WannaCry Websites Connectivity calculator Shadow IT Text Messaging HBO Webinar MSP Twitter Document Management Conferencing Experience Microsoft Word control Mobile Data Theft Content Filter Microsoft Excel IT solutions intranet WSJ Gifts Exchange Video Games Professional Services Computing Monitoring Distributed Denial of Service altivista Virtual Reality File Sharing IT Management Laptop Windows 10s Uninterrupted Power Supply Scam IT budget Music SBS Travel Nanotechnology Analysis Management Maintenance compaq Storage Credit Cards WIndows Server 2008 Touchpad Hard Disk Drive Employer Employee Relationship App store Wearable Technology Analytics Tablets Reputation Root Cause Analysis Financial Technology Keyboard Device Security hp Instant Messaging Advertising FAQ Computer Accessories Identities Worker Commute domain NFL Augmented Reality Mobile Device CrashOverride Thank You Congratulations Emergency Cache Monitors Remote Monitoring Worker

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...