Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      Big Tech is going nuclear

      Big Tech is going nuclear

      10 April 2026
      Microsoft is sacrificing Edge on the altar of Copilot

      Microsoft is sacrificing Edge on the altar of Copilot

      10 April 2026
      5G expected to reshape South Africa's wireless broadband market

      5G expected to reshape South Africa’s wireless broadband market

      10 April 2026
      Warning that South Africa's digital competitiveness is in retreat

      Warning that South Africa’s digital competitiveness is in retreat

      10 April 2026
      South Africa's biggest banks are lining up behind Optasia - Salvador Anglada

      South Africa’s biggest banks are lining up behind Optasia

      10 April 2026
    • World
      Anthropic mulls building its own AI chips

      Anthropic mulls building its own AI chips

      10 April 2026
      DeepSeek V4 to run on Huawei silicon as China builds its own AI stack

      DeepSeek V4 to run on Huawei silicon as China builds its own AI stack

      4 April 2026
      Amazon in talks to buy satellite operator Globalstar

      Amazon in talks to buy satellite operator Globalstar

      2 April 2026

      Apple plans to open Siri to rival AI services

      27 March 2026
      It's official: ads are coming to ChatGPT

      It’s official: ads are coming to ChatGPT

      23 March 2026
    • In-depth
      Africa switches on as Europe dims the lights

      Africa switches on as Europe dims the lights

      9 April 2026
      The biggest untapped EV market on Earth is hiding in plain sight

      The biggest untapped EV market on Earth is hiding in plain sight

      1 April 2026
      The R18-billion tech giant hiding in plain sight - Jens Montanana

      The R16-billion tech giant hiding in plain sight

      26 March 2026
      The last generation of coders

      The last generation of coders

      18 February 2026
      Sentech is in dire straits

      Sentech is in dire straits

      10 February 2026
    • TCS
      TCS+ | Vodacom Business moves to crack the SME tech gap - Andrew Fulton, Sannesh Beharie

      TCS+ | Vodacom Business moves to crack the SME tech gap

      7 April 2026
      TCS | MTN's Divysh Joshi on the strategy behind Pi - Divyesh Joshi

      TCS | MTN’s Divyesh Joshi on the strategy behind Pi

      1 April 2026
      Anoosh Rooplal

      TCS | Anoosh Rooplal on the Post Office’s last stand

      27 March 2026
      Meet the CIO | HealthBridge CTO Anton Fatti on the future of digital health

      Meet the CIO | Healthbridge CTO Anton Fatti on the future of digital health

      23 March 2026
      TCS+ | Arctic Wolf unpacks the evolving threat landscape for SA businesses - Clare Loveridge and Jason Oehley

      TCS+ | Arctic Wolf unpacks the evolving threat landscape for SA businesses

      19 March 2026
    • Opinion
      The conflict of interest at the heart of PayShap's slow adoption - Cheslyn Jacobs

      The conflict of interest at the heart of PayShap’s slow adoption

      26 March 2026
      South Africa's energy future hinges on getting wheeling right - Aishah Gire

      South Africa’s energy future hinges on getting wheeling right

      10 March 2026
      Hold the doom: the case for a South African comeback - Duncan McLeod

      Apple just dropped a bomb on the Windows world

      5 March 2026
      R230-million in the bag for Endeavor's third Harvest Fund - Alison Collier

      VC’s centre of gravity is shifting – and South Africa is in the frame

      3 March 2026
      Hold the doom: the case for a South African comeback - Duncan McLeod

      Hold the doom: the case for a South African comeback

      26 February 2026
    • Company Hubs
      • 1Stream
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • Ascent Technology
      • AvertITD
      • BBD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • HOSTAFRICA
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • Kaspersky
      • LSD Open
      • Mitel
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Telviva
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • HealthTech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Policy and regulation
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Sections » Internet of Things » Is cybersecurity holding back IoT uptake?

    Is cybersecurity holding back IoT uptake?

    Promoted | In the business-to-business sector, cybersecurity presents a significant obstacle to IoT adoption, say experts.
    By iONLINE31 October 2024
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp
    Is cybersecurity holding back IoT uptake? - David Farquharson iONLINE CEO
    iONLINE Connected Networks CEO David Farquharson

    The internet of things presents plenty of opportunities, but almost as many vulnerabilities. While IoT adoption has accelerated in recent years, it still works in largely siloed clusters, across verticals. To unlock its full potential, better integration is needed both within and across these various verticals.

    Except cybersecurity is a major obstacle to this integration.

    If IoT is to reach its potential as a fully interconnected ecosystem, it and cybersecurity need to work better together.

    When risks erode trust

    We are now at something of a crossroads, where the IoT can continue to deliver incremental value through these siloed applications, or evolve into a fully integrated ecosystem. Achieving this integration, however, hinges on overcoming several obstacles first, the most crucial being the cybersecurity risks that erode trust among users.

    The trouble comes in that cybersecurity is not simply an add-on. Rather, it is a foundational element required to unlock the vast and varied capabilities of IoT.

    McKinsey, in its report Cybersecurity for the IoT: how trust can unlock value, notes that poor cybersecurity strategies have created vulnerabilities that make adoption difficult. For example, studies have shown that there exists a significant disconnect between IoT buyers and providers when it comes to the importance of digital trust and privacy.

    Visit www.ionlinesp.com to learn more

    Key barriers to widespread IoT adoption and integration include:

    • Cybersecurity risks undermining trust and integration;
    • A lack of seamless interaction among IoT devices; and
    • Existing solutions not being sufficiently secure, leading to vulnerabilities and dependency on updates.

    Research shows that IoT buyers value digital trust and privacy more highly than providers realise. Siloed decision making compounds this, with contrasting decision-making processes between IoT and cybersecurity departments further stilting adoption.

    So, what’s the solution?

    Collaboration is the key

    Firstly, industry players need to acknowledge the challenges and commit to finding ways to solve them. Then, they need to agree on standards moving forward. This requires collaboration between IoT and cybersecurity solution providers. It also involves improved cybersecurity measures, and new industry standards for both security and interoperability.

    David Farquharson, CEO of iONLINE Connected Networks, agrees that the journey towards an interconnected IoT environment is a collective responsibility.

    “This collaboration extends beyond technology. It’s about building trust through transparency and open communication about the cybersecurity measures in place,” he says. “When businesses see their third-party providers committed to protecting their data, they are more likely to embrace IoT solutions.”

    If the worlds of IoT and cybersecurity can successfully converge and develop comprehensive solutions, we could see IoT spending increase by as much as 40%. Source: iONLINE

    Farquharson underscores the importance of cybersecurity, saying that as IoT increasingly integrates into critical infrastructure and enterprise systems, so securing devices, networks and systems becomes more urgent.

    “Unfortunately, as the IoT landscape evolves, so do the threats,” he says. “Ensuring you have the right expertise at your disposal and have partnered with the right company to deliver the secure solutions you need is how you ensure longevity.”

    Together the IoT and cybersecurity sectors can create a resilient ecosystem where users can take full advantage of smart technologies while keeping sensitive data safe. The IoT environment of the near future will comprise billions of connected devices communicating through heterogeneous operating systems, networks and platforms, using cloud-based data storage and cloud-native programming. It’s the seamless experience for which industry players long, and it is this which will boost adoption of IoT.

    Where to from here

    McKinsey states that if the two worlds of IoT and cybersecurity can successfully converge, we could see IoT spending increase by as much as 40%. This could boost the market value to between US$625-billion and $750-billion by 2030.

    “By integrating advanced security features into our IoT connectivity solutions at iONLINE, we transform fragmented systems into a trusted and cohesive connected network that works uninterrupted across industries and use cases,” says Farquharson. “This not only addresses existing vulnerabilities but also sets a foundation for future advancements.”

    The potential is easy to see, he continues. “Without a doubt, the convergence of IoT and cybersecurity will ignite innovation, leading to even smarter and more secure systems that positively impact all areas of life. Organisations that adapt to these changes swiftly and efficiently stand to benefit enormously.”

    As the IoT landscape continues to evolve, now is the time for organisations to prioritise cybersecurity in their digital transformation strategies. Explore how iONLINE Connected Networks can help you navigate this journey and secure your IoT investments. Visit our website to learn more about our solutions, read our latest insights or book a demo with one of our IoT connectivity experts to unlock the full potential of IoT and drive innovation at scale.

    You can follow us on LinkedIn and Facebook, where we share insights, trends, use cases and industry news every week.

    About iONLINE
    iONLINE Connected Networks is a leading connectivity provider that delivers cutting-edge technology solutions to businesses around the world. Its flagship product is its multi-network-resilient global IoT connectivity solution, an intelligent network switching Sim (eUICC) called FlexiSIM, which connects in 189-plus countries on over 700 carriers.

    With offices in South Africa, the UK, the US and Australia, iONLINE is dedicated to providing exceptional customer service and ensuring that its clients remain connected in a constantly changing world. Furthermore, iONLINE is committed to promoting positive change for both society and the environment, reflecting its dedication to corporate social responsibility. Visit www.ionlinesp.com to learn more.

    • Read more articles by iONLINE on TechCentral
    • This promoted content was paid for by the party concerned

    Don’t miss:

    Fortify your IoT security – here’s how

    Follow TechCentral on Google News Add TechCentral as your preferred source on Google


    cybersecurity David Farquharson internet of things iONLINE IoT IoT connectivity IoT security security technology
    WhatsApp YouTube
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleCirrus Bridge: closing the gap in consultancy with an end-to-end approach
    Next Article South Africa seeks billions in climate funds even as it keeps coal plants open

    Related Posts

    iONLINE launches Sense Hub, simplifying IoT deployment

    iONLINE launches Sense Hub, simplifying IoT deployment

    18 November 2025
    iONLINE's new global network core delivers real-time connectivity control

    iONLINE’s new global network core delivers real-time connectivity control

    7 November 2025
    Starting local, growing global: iONLINE celebrates 20 years of innovation

    Starting local, growing global: iONLINE celebrates 20 years of innovation

    30 June 2025
    Add A Comment

    Comments are closed.

    Company News
    What South African parents look for in an online school - CambriLearn

    What South African parents look for in an online school

    9 April 2026
    Modernising legacy systems - without the downtime - BBD Software

    Modernising legacy systems – without the downtime

    9 April 2026
    M-KOPA's 2025 impact: women at the heart of digital inclusion

    M-KOPA’s 2025 impact: women at the heart of digital inclusion

    9 April 2026
    Opinion
    The conflict of interest at the heart of PayShap's slow adoption - Cheslyn Jacobs

    The conflict of interest at the heart of PayShap’s slow adoption

    26 March 2026
    South Africa's energy future hinges on getting wheeling right - Aishah Gire

    South Africa’s energy future hinges on getting wheeling right

    10 March 2026
    Hold the doom: the case for a South African comeback - Duncan McLeod

    Apple just dropped a bomb on the Windows world

    5 March 2026

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    Big Tech is going nuclear

    Big Tech is going nuclear

    10 April 2026
    Microsoft is sacrificing Edge on the altar of Copilot

    Microsoft is sacrificing Edge on the altar of Copilot

    10 April 2026
    5G expected to reshape South Africa's wireless broadband market

    5G expected to reshape South Africa’s wireless broadband market

    10 April 2026
    Warning that South Africa's digital competitiveness is in retreat

    Warning that South Africa’s digital competitiveness is in retreat

    10 April 2026
    © 2009 - 2026 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}