ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

According to Survey, IoT Use is Up While Trust is Down

According to Survey, IoT Use is Up While Trust is Down

While the Internet of Things has increased in use, that doesn’t mean that its users necessarily trust it just yet. Furthermore, many of these users aren’t fully aware of the actual extent that the IoT has in their lives. These results, from a recent survey by Cisco, could be pertinent to your business and how you manage it. With so many new devices connecting to your network, how can you expect them to affect operations?

Cisco’s survey covers 3,000 North American adults with at least some knowledge of IoT devices. As such, it provides a lot of great information about how businesses and consumers respond to the Internet of Things. Most consumers aren’t necessarily aware of just how far-reaching the Internet of Things can be, even if they use them on a regular basis. In fact, the Internet of Things includes devices that might not have traditionally benefited from a connection to the Internet. Some of these are car navigation systems, street lamps, security systems, and health-monitoring devices.

Most users knew about some of the more familiar and useful Internet of Things devices, but others were amazed by some of the more unusual IoT devices out there. Even though there are disparities in awareness, users generally responded positively to Internet-connected devices, provided they knowingly used them. 53 percent of users claimed that connected devices provided an easier way of life, while 47 percent found that their lives were more efficient with them. 34 percent of users also argue that Internet of Things devices have made them feel more secure.

However, the real kicker of this survey is that only 9 percent of respondents could say that they felt their data was more secure or private thanks to the Internet of Things. Furthermore, 14% of users felt that the way their data was being used wasn’t transparent enough for their liking, which is certainly a major concern. Even if the device helps you, you still have to worry whether or not it’s compromising your security.

Despite these suspicions, it’s likely that the Internet of Things is going to continue growing. Therefore, you must make sure that your company is taking IoT devices into account around your office. Implementing a Bring Your Own Device (BYOD) strategy is the best way to make sure that your business is always aware of devices found on the company network. Implementing such a policy ensures that your business has a plan for personal devices in the workplace, and it can help to limit the damage done by them in the event of an incident.

ClearView IT can help your business prepare for the Internet of Things. To learn more, reach out to us at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Phishing Business Management Cybersecurity IT Services Backup Ransomware Data Backup Smartphone communications Upgrade Smartphones Microsoft Office Small Business Mobile Devices Network Managed IT Services Data Recovery Communication Quick Tips Productivity Social Media VoIP Users Mobile Device Tech Term Automation Business Continuity Facebook Windows 10 Disaster Recovery Covid-19 Passwords Holiday Managed Service Apps Windows 10 IT Support Browser Miscellaneous Cloud Computing Outsourced IT Data Management Internet of Things Remote Work Managed Service Provider Government Saving Money Operating System Gadgets Workplace Strategy Networking Windows Artificial Intelligence Managed IT services Server Bandwidth Mobile Device Management Encryption Blockchain Business Technology App Remote WiFi Virtualization Spam Information Budget History Apple Gmail Information Technology Office Employee/Employer Relationship Two-factor Authentication Office 365 Data Security Wi-Fi Cybercrime Health BDR Analytics Big Data Conferencing Access Control Hacker Voice over Internet Protocol Vendor Patch Management Employer-Employee Relationship Compliance Remote Monitoring Cost Management Remote Computing IT Management Help Desk Hacking Training Document Management Save Money Money Applications Mobile Office Search... Customer Service Unified Threat Management Best Practice Firewall BYOD Managed Services Vulnerabilities Retail Augmented Reality Project Management Computing Word Alert Vendor Management Hard Drive IBM Hiring/Firing Website Outlook Data loss Password Legal Data storage Social Engineering Cryptocurrency Marketing Remote Workers Black Market Running Cable Social Sports Cleaning Paperless Office SaaS DDoS Windows 7 Antivirus Robot Free Resource Storage Maintenance Monitoring Windows 11 How To Healthcare iPhone Education Cortana Content Filtering Websites User Twitter Meetings Mobility Router Law Enforcement Google Maps End of Support The Internet of Things YouTube Printer Scam Chrome VPN Laptop Mobile Computing Travel Update Virtual Reality Data Breach Office Tips IT Consultant Processor Private Cloud Memory Taxes Virtual Desktop Experience Customer Relationship Management Managed Services Provider Co-Managed IT Entertainment Politics Virtual Private Network Machine Learning Settings Multi-factor Authentication Physical Security Disaster Current Events Solid State Drive Solutions Saving Time Lithium-ion battery Start Menu Chromebook Images 101 Computer Care Drones Integration Downloads Computers Bitcoin HIPAA Display Vulnerability Automobile Processors Telephone Software as a Service How To Data Protection Employees Microchip Avoiding Downtime Flexibility Excel Holidays Cooperation Hack Identity Theft Notifications Video Conferencing Wireless Technology eWaste Virtual Assistant Unified Communications PowerPoint Administration Virtual Machines Tech Terms Google Docs Computer Repair Managed IT Bluetooth Downtime Presentation Specifications Safety Professional Services Distributed Denial of Service Digital Equifax Business Communications Digital Payment Internet Service Provider Phone System Azure SharePoint Health IT Workplace Strategies Managed IT Service Tactics Worker Hard Drive Disposal Regulations Compliance Memes Botnet Username Access Time Management Rental Service Startup Human Resources Public Cloud Micrsooft Freedom of Information Net Neutrality Navigation Addiction Flash email scam Financial Data Telephone Systems Mobile Security Risk Management Business Growth IT Computer Accessories Audit Spyware User Tip Legislation Google Apps File Sharing News Staffing Smart Technology IP Address Evernote Redundancy Network Management Telework Banking Smartwatch Google Wallet Communitications Microsoft 365 Cache Proxy Server Unified Threat Management Messenger Emails Workers Deep Learning Fake News Procurement Service Level Agreement Computing Infrastructure FinTech Business Metrics Device security CES CCTV Hosted Solution IT Assessment Printing Management Competition Touchscreen Books Wireless Headphones Microsoft Excel Supply Chain Management Recovery Value Society Troubleshooting Supply Chain Cyber security Tech Emergency Going Green Language Business Cards Organization Computer Malfunction LiFi Smart Devices Entrepreneur Error Vendor Mangement Application Bookmark Reading Samsung Monitors Remote Working Documents Visible Light Communication Windows 8 Workplace Trend Micro Term Business Intelligence Download Uninterrupted Power Supply Piracy AI Webcam Business Mangement HTML Digital Security Cameras Electronic Health Records Transportation Browsers Relocation Nanotechnology Tablets Displays Securty Advertising Wasting Time Tech Support Business Owner Scams eCommerce Domains Google Play Modem Upload Work/Life Balance Software License Videos Supercomputer Surveillance Google Calendar Social Network Data Analysis Virus Screen Reader Managing Costs Motion Sickness Cables Security Cameras SSID In Internet of Things Trends Mobile Technology Google Drive Hacks Devices Media Network Congestion Development Employer/Employee Relationships Comparison Customer Resource management Virtual Machine Public Speaking Fileless Malware Reliable Computing Writing Tip of the week Reviews Streaming Media Inbound Marketing Point of Sale Optimization Knowledge Gamification Corporate Profile Company Culture Telephony Regulations 2FA Employer Employee Relationship Teamwork Television Keyboard Telephone System Hypervisor Hard Drives Directions Scalability Backup and Disaster Recovery Cabling Data Storage Shortcuts Shopping G Suite Proactive IT Medical IT intranet Administrator Content Tablet Text Messaging Desktop VoIP Bring Your Own Device Accountants Paperless Tracking Electronic Payment Wireless SQL Server Mouse Shortcut Electronic Medical Records Licensing Heating/Cooling Environment Database PCI DSS Be Proactive Gig Economy Web Server Windows XP Music Humor Social Networking

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?