Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      MTN and Vodacom dwarf South Africa's listed tech sector

      MTN and Vodacom dwarf South Africa’s listed tech sector

      20 March 2026
      SA firm opens Africa's largest space hardware factory

      SA firm opens Africa’s largest space hardware factory

      20 March 2026
      OpenClaw fever grips China

      OpenClaw fever grips China

      20 March 2026
      OpenAI plans desktop 'super app'

      OpenAI plans desktop ‘super app’

      20 March 2026
      How a WhatsApp bundle exposed a fault line in SA mobile

      How a WhatsApp bundle exposed a fault line in SA mobile

      19 March 2026
    • World
      Mystery Chinese AI model revealed to be Xiaomi's

      Mystery Chinese AI model revealed to be Xiaomi’s

      19 March 2026
      A mystery AI model has developers buzzing

      A mystery AI model has developers buzzing

      18 March 2026
      Samsung's trifold gamble ends in retreat

      Samsung’s trifold gamble ends in retreat

      17 March 2026
      Nvidia targets $1-trillion in AI chip sales as inference demand surges - Jensen Huang

      Nvidia targets $1-trillion in AI chip sales as inference demand surges

      17 March 2026
      Peter Thiel's secretive Rome conference draws Church attention

      Peter Thiel’s secretive Rome conference draws Church attention

      16 March 2026
    • In-depth
      The last generation of coders

      The last generation of coders

      18 February 2026
      Sentech is in dire straits

      Sentech is in dire straits

      10 February 2026
      How liberalisation is rewiring South Africa's power sector

      How liberalisation is rewiring South Africa’s power sector

      21 January 2026
      The top-performing South African tech shares of 2025

      The top-performing South African tech shares of 2025

      12 January 2026
      Digital authoritarianism grows as African states normalise internet blackouts

      Digital authoritarianism grows as African states normalise internet blackouts

      19 December 2025
    • TCS
      TCS+ | Arctic Wolf unpacks the evolving threat landscape for SA businesses - Clare Loveridge and Jason Oehley

      TCS+ | Arctic Wolf unpacks the evolving threat landscape for SA businesses

      19 March 2026
      TCS+ | Vox Kiwi: a wireless solution promising a fibre-like experience - Theo van Zyl

      TCS+ | Vox Kiwi: a wireless solution promising a fibre-like experience

      13 March 2026
      TCS+ | Flipping the narrative on AI in the Global South - Josefin Rosén

      TCS+ | Flipping the narrative on AI in the Global South

      13 March 2026
      TCS | Sink or swim? Antony Makins on how AI is rewriting the rules of work

      TCS | Sink or swim? Antony Makins on how AI is rewriting the rules of work

      5 March 2026
      TCS+ | Bolt ups the ante on platform safety - Simo Kalajdzic

      TCS+ | Bolt ups the ante on platform safety

      4 March 2026
    • Opinion
      South Africa's energy future hinges on getting wheeling right - Aishah Gire

      South Africa’s energy future hinges on getting wheeling right

      10 March 2026
      Hold the doom: the case for a South African comeback - Duncan McLeod

      Apple just dropped a bomb on the Windows world

      5 March 2026
      VC's centre of gravity is shifting - and South Africa is in the frame - Alison Collier

      VC’s centre of gravity is shifting – and South Africa is in the frame

      3 March 2026
      Hold the doom: the case for a South African comeback - Duncan McLeod

      Hold the doom: the case for a South African comeback

      26 February 2026
      The AI fraud crisis your bank is not ready for - Andries Maritz

      The AI fraud crisis your bank is not ready for

      18 February 2026
    • Company Hubs
      • 1Stream
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • HOSTAFRICA
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • LSD Open
      • Mitel
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • HealthTech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Policy and regulation
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Sections » Internet of Things » Is cybersecurity holding back IoT uptake?

    Is cybersecurity holding back IoT uptake?

    Promoted | In the business-to-business sector, cybersecurity presents a significant obstacle to IoT adoption, say experts.
    By iONLINE31 October 2024
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp
    Is cybersecurity holding back IoT uptake? - David Farquharson iONLINE CEO
    iONLINE Connected Networks CEO David Farquharson

    The internet of things presents plenty of opportunities, but almost as many vulnerabilities. While IoT adoption has accelerated in recent years, it still works in largely siloed clusters, across verticals. To unlock its full potential, better integration is needed both within and across these various verticals.

    Except cybersecurity is a major obstacle to this integration.

    If IoT is to reach its potential as a fully interconnected ecosystem, it and cybersecurity need to work better together.

    When risks erode trust

    We are now at something of a crossroads, where the IoT can continue to deliver incremental value through these siloed applications, or evolve into a fully integrated ecosystem. Achieving this integration, however, hinges on overcoming several obstacles first, the most crucial being the cybersecurity risks that erode trust among users.

    The trouble comes in that cybersecurity is not simply an add-on. Rather, it is a foundational element required to unlock the vast and varied capabilities of IoT.

    McKinsey, in its report Cybersecurity for the IoT: how trust can unlock value, notes that poor cybersecurity strategies have created vulnerabilities that make adoption difficult. For example, studies have shown that there exists a significant disconnect between IoT buyers and providers when it comes to the importance of digital trust and privacy.

    Visit www.ionlinesp.com to learn more

    Key barriers to widespread IoT adoption and integration include:

    • Cybersecurity risks undermining trust and integration;
    • A lack of seamless interaction among IoT devices; and
    • Existing solutions not being sufficiently secure, leading to vulnerabilities and dependency on updates.

    Research shows that IoT buyers value digital trust and privacy more highly than providers realise. Siloed decision making compounds this, with contrasting decision-making processes between IoT and cybersecurity departments further stilting adoption.

    So, what’s the solution?

    Collaboration is the key

    Firstly, industry players need to acknowledge the challenges and commit to finding ways to solve them. Then, they need to agree on standards moving forward. This requires collaboration between IoT and cybersecurity solution providers. It also involves improved cybersecurity measures, and new industry standards for both security and interoperability.

    David Farquharson, CEO of iONLINE Connected Networks, agrees that the journey towards an interconnected IoT environment is a collective responsibility.

    “This collaboration extends beyond technology. It’s about building trust through transparency and open communication about the cybersecurity measures in place,” he says. “When businesses see their third-party providers committed to protecting their data, they are more likely to embrace IoT solutions.”

    If the worlds of IoT and cybersecurity can successfully converge and develop comprehensive solutions, we could see IoT spending increase by as much as 40%. Source: iONLINE

    Farquharson underscores the importance of cybersecurity, saying that as IoT increasingly integrates into critical infrastructure and enterprise systems, so securing devices, networks and systems becomes more urgent.

    “Unfortunately, as the IoT landscape evolves, so do the threats,” he says. “Ensuring you have the right expertise at your disposal and have partnered with the right company to deliver the secure solutions you need is how you ensure longevity.”

    Together the IoT and cybersecurity sectors can create a resilient ecosystem where users can take full advantage of smart technologies while keeping sensitive data safe. The IoT environment of the near future will comprise billions of connected devices communicating through heterogeneous operating systems, networks and platforms, using cloud-based data storage and cloud-native programming. It’s the seamless experience for which industry players long, and it is this which will boost adoption of IoT.

    Where to from here

    McKinsey states that if the two worlds of IoT and cybersecurity can successfully converge, we could see IoT spending increase by as much as 40%. This could boost the market value to between US$625-billion and $750-billion by 2030.

    “By integrating advanced security features into our IoT connectivity solutions at iONLINE, we transform fragmented systems into a trusted and cohesive connected network that works uninterrupted across industries and use cases,” says Farquharson. “This not only addresses existing vulnerabilities but also sets a foundation for future advancements.”

    The potential is easy to see, he continues. “Without a doubt, the convergence of IoT and cybersecurity will ignite innovation, leading to even smarter and more secure systems that positively impact all areas of life. Organisations that adapt to these changes swiftly and efficiently stand to benefit enormously.”

    As the IoT landscape continues to evolve, now is the time for organisations to prioritise cybersecurity in their digital transformation strategies. Explore how iONLINE Connected Networks can help you navigate this journey and secure your IoT investments. Visit our website to learn more about our solutions, read our latest insights or book a demo with one of our IoT connectivity experts to unlock the full potential of IoT and drive innovation at scale.

    You can follow us on LinkedIn and Facebook, where we share insights, trends, use cases and industry news every week.

    About iONLINE
    iONLINE Connected Networks is a leading connectivity provider that delivers cutting-edge technology solutions to businesses around the world. Its flagship product is its multi-network-resilient global IoT connectivity solution, an intelligent network switching Sim (eUICC) called FlexiSIM, which connects in 189-plus countries on over 700 carriers.

    With offices in South Africa, the UK, the US and Australia, iONLINE is dedicated to providing exceptional customer service and ensuring that its clients remain connected in a constantly changing world. Furthermore, iONLINE is committed to promoting positive change for both society and the environment, reflecting its dedication to corporate social responsibility. Visit www.ionlinesp.com to learn more.

    • Read more articles by iONLINE on TechCentral
    • This promoted content was paid for by the party concerned

    Don’t miss:

    Fortify your IoT security – here’s how

    Follow TechCentral on Google News Add TechCentral as your preferred source on Google


    cybersecurity David Farquharson internet of things iONLINE IoT IoT connectivity IoT security security technology
    WhatsApp YouTube
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleCirrus Bridge: closing the gap in consultancy with an end-to-end approach
    Next Article South Africa seeks billions in climate funds even as it keeps coal plants open

    Related Posts

    iONLINE launches Sense Hub, simplifying IoT deployment

    iONLINE launches Sense Hub, simplifying IoT deployment

    18 November 2025
    iONLINE's new global network core delivers real-time connectivity control

    iONLINE’s new global network core delivers real-time connectivity control

    7 November 2025
    Starting local, growing global: iONLINE celebrates 20 years of innovation

    Starting local, growing global: iONLINE celebrates 20 years of innovation

    30 June 2025
    Add A Comment

    Comments are closed.

    Company News

    How South African executives can crack the AI ROI code

    20 March 2026
    Africa's first Nvidia RTX Pro GPU servers have landed

    Africa’s first Nvidia RTX Pro GPU servers have landed

    19 March 2026
    How Acer Africa is bridging the digital divide through local innovation

    How Acer Africa is bridging the digital divide through local innovation

    19 March 2026
    Opinion
    South Africa's energy future hinges on getting wheeling right - Aishah Gire

    South Africa’s energy future hinges on getting wheeling right

    10 March 2026
    Hold the doom: the case for a South African comeback - Duncan McLeod

    Apple just dropped a bomb on the Windows world

    5 March 2026
    VC's centre of gravity is shifting - and South Africa is in the frame - Alison Collier

    VC’s centre of gravity is shifting – and South Africa is in the frame

    3 March 2026

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    MTN and Vodacom dwarf South Africa's listed tech sector

    MTN and Vodacom dwarf South Africa’s listed tech sector

    20 March 2026
    SA firm opens Africa's largest space hardware factory

    SA firm opens Africa’s largest space hardware factory

    20 March 2026
    OpenClaw fever grips China

    OpenClaw fever grips China

    20 March 2026
    OpenAI plans desktop 'super app'

    OpenAI plans desktop ‘super app’

    20 March 2026
    © 2009 - 2026 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}