Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      Provinces ordered to enforce ban on online casinos

      Provinces ordered to enforce ban on online casinos

      27 February 2026
      Liquid secures nearly R10-billion in new funding - Liquid Intelligent Technologies

      Liquid secures nearly R10-billion in new funding

      27 February 2026
      MTN Nigeria in dramatic full-year turnaround - Karl Toriola

      MTN Nigeria in dramatic full-year turnaround

      27 February 2026
      Global GPU shortage set to deepen gaming industry woes

      Global GPU shortage set to deepen gaming industry woes

      27 February 2026
      Netflix walks away from Warner Bros deal

      Netflix walks away from ‘irrational’ Warner Bros deal

      27 February 2026
    • World

      Stripe mulling bid for PayPal: report

      25 February 2026
      Xbox chief Phil Spencer retires from Microsoft

      Xbox chief Phil Spencer retires from Microsoft

      22 February 2026
      Prominent Southern African journalist targeted with Predator spyware

      Prominent Southern African journalist targeted with Predator spyware

      18 February 2026
      More drama in Warner Bros tug of war

      More drama in Warner Bros tug of war

      17 February 2026
      Russia bans WhatsApp

      Russia bans WhatsApp

      12 February 2026
    • In-depth
      The last generation of coders

      The last generation of coders

      18 February 2026
      Sentech is in dire straits

      Sentech is in dire straits

      10 February 2026
      How liberalisation is rewiring South Africa's power sector

      How liberalisation is rewiring South Africa’s power sector

      21 January 2026
      The top-performing South African tech shares of 2025

      The top-performing South African tech shares of 2025

      12 January 2026
      Digital authoritarianism grows as African states normalise internet blackouts

      Digital authoritarianism grows as African states normalise internet blackouts

      19 December 2025
    • TCS
      Watts & Wheels S1E4: 'We drive an electric Uber'

      Watts & Wheels S1E4: ‘We drive an electric Uber’

      10 February 2026
      TCS+ | How Cloud On Demand is helping SA businesses succeed in the cloud - Xhenia Rhode, Dion Kalicharan

      TCS+ | Cloud On Demand and Consnet: inside a real-world AWS partner success story

      30 January 2026
      Watts & Wheels S1E4: 'We drive an electric Uber'

      Watts & Wheels S1E3: ‘BYD’s Corolla Cross challenger’

      30 January 2026
      Watts & Wheels S1E4: 'We drive an electric Uber'

      Watts & Wheels S1E2: ‘China attacks, BMW digs in, Toyota’s sublime supercar’

      23 January 2026

      TCS+ | Why cybersecurity is becoming a competitive advantage for SA businesses

      20 January 2026
    • Opinion
      The AI fraud crisis your bank is not ready for - Andries Maritz

      The AI fraud crisis your bank is not ready for

      18 February 2026
      A million reasons monopolies don't work - Duncan McLeod

      A million reasons monopolies don’t work

      10 February 2026
      The author, Business Leadership South Africa CEO Busi Mavuso

      Eskom unbundling U-turn threatens to undo hard-won electricity gains

      9 February 2026
      South Africa's skills advantage is being overlooked at home - Richard Firth

      South Africa’s skills advantage is being overlooked at home

      29 January 2026
      Why Elon Musk's Starlink is a 'hard no' for me - Songezo Zibi

      Why Elon Musk’s Starlink is a ‘hard no’ for me

      26 January 2026
    • Company Hubs
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • LSD Open
      • Mitel
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • HealthTech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Policy and regulation
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Sections » Internet of Things » Is cybersecurity holding back IoT uptake?

    Is cybersecurity holding back IoT uptake?

    Promoted | In the business-to-business sector, cybersecurity presents a significant obstacle to IoT adoption, say experts.
    By iONLINE31 October 2024
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp
    Is cybersecurity holding back IoT uptake? - David Farquharson iONLINE CEO
    iONLINE Connected Networks CEO David Farquharson

    The internet of things presents plenty of opportunities, but almost as many vulnerabilities. While IoT adoption has accelerated in recent years, it still works in largely siloed clusters, across verticals. To unlock its full potential, better integration is needed both within and across these various verticals.

    Except cybersecurity is a major obstacle to this integration.

    If IoT is to reach its potential as a fully interconnected ecosystem, it and cybersecurity need to work better together.

    When risks erode trust

    We are now at something of a crossroads, where the IoT can continue to deliver incremental value through these siloed applications, or evolve into a fully integrated ecosystem. Achieving this integration, however, hinges on overcoming several obstacles first, the most crucial being the cybersecurity risks that erode trust among users.

    The trouble comes in that cybersecurity is not simply an add-on. Rather, it is a foundational element required to unlock the vast and varied capabilities of IoT.

    McKinsey, in its report Cybersecurity for the IoT: how trust can unlock value, notes that poor cybersecurity strategies have created vulnerabilities that make adoption difficult. For example, studies have shown that there exists a significant disconnect between IoT buyers and providers when it comes to the importance of digital trust and privacy.

    Visit www.ionlinesp.com to learn more

    Key barriers to widespread IoT adoption and integration include:

    • Cybersecurity risks undermining trust and integration;
    • A lack of seamless interaction among IoT devices; and
    • Existing solutions not being sufficiently secure, leading to vulnerabilities and dependency on updates.

    Research shows that IoT buyers value digital trust and privacy more highly than providers realise. Siloed decision making compounds this, with contrasting decision-making processes between IoT and cybersecurity departments further stilting adoption.

    So, what’s the solution?

    Collaboration is the key

    Firstly, industry players need to acknowledge the challenges and commit to finding ways to solve them. Then, they need to agree on standards moving forward. This requires collaboration between IoT and cybersecurity solution providers. It also involves improved cybersecurity measures, and new industry standards for both security and interoperability.

    David Farquharson, CEO of iONLINE Connected Networks, agrees that the journey towards an interconnected IoT environment is a collective responsibility.

    “This collaboration extends beyond technology. It’s about building trust through transparency and open communication about the cybersecurity measures in place,” he says. “When businesses see their third-party providers committed to protecting their data, they are more likely to embrace IoT solutions.”

    If the worlds of IoT and cybersecurity can successfully converge and develop comprehensive solutions, we could see IoT spending increase by as much as 40%. Source: iONLINE

    Farquharson underscores the importance of cybersecurity, saying that as IoT increasingly integrates into critical infrastructure and enterprise systems, so securing devices, networks and systems becomes more urgent.

    “Unfortunately, as the IoT landscape evolves, so do the threats,” he says. “Ensuring you have the right expertise at your disposal and have partnered with the right company to deliver the secure solutions you need is how you ensure longevity.”

    Together the IoT and cybersecurity sectors can create a resilient ecosystem where users can take full advantage of smart technologies while keeping sensitive data safe. The IoT environment of the near future will comprise billions of connected devices communicating through heterogeneous operating systems, networks and platforms, using cloud-based data storage and cloud-native programming. It’s the seamless experience for which industry players long, and it is this which will boost adoption of IoT.

    Where to from here

    McKinsey states that if the two worlds of IoT and cybersecurity can successfully converge, we could see IoT spending increase by as much as 40%. This could boost the market value to between US$625-billion and $750-billion by 2030.

    “By integrating advanced security features into our IoT connectivity solutions at iONLINE, we transform fragmented systems into a trusted and cohesive connected network that works uninterrupted across industries and use cases,” says Farquharson. “This not only addresses existing vulnerabilities but also sets a foundation for future advancements.”

    The potential is easy to see, he continues. “Without a doubt, the convergence of IoT and cybersecurity will ignite innovation, leading to even smarter and more secure systems that positively impact all areas of life. Organisations that adapt to these changes swiftly and efficiently stand to benefit enormously.”

    As the IoT landscape continues to evolve, now is the time for organisations to prioritise cybersecurity in their digital transformation strategies. Explore how iONLINE Connected Networks can help you navigate this journey and secure your IoT investments. Visit our website to learn more about our solutions, read our latest insights or book a demo with one of our IoT connectivity experts to unlock the full potential of IoT and drive innovation at scale.

    You can follow us on LinkedIn and Facebook, where we share insights, trends, use cases and industry news every week.

    About iONLINE
    iONLINE Connected Networks is a leading connectivity provider that delivers cutting-edge technology solutions to businesses around the world. Its flagship product is its multi-network-resilient global IoT connectivity solution, an intelligent network switching Sim (eUICC) called FlexiSIM, which connects in 189-plus countries on over 700 carriers.

    With offices in South Africa, the UK, the US and Australia, iONLINE is dedicated to providing exceptional customer service and ensuring that its clients remain connected in a constantly changing world. Furthermore, iONLINE is committed to promoting positive change for both society and the environment, reflecting its dedication to corporate social responsibility. Visit www.ionlinesp.com to learn more.

    • Read more articles by iONLINE on TechCentral
    • This promoted content was paid for by the party concerned

    Don’t miss:

    Fortify your IoT security – here’s how

    Follow TechCentral on Google News Add TechCentral as your preferred source on Google


    cybersecurity David Farquharson internet of things iONLINE IoT IoT connectivity IoT security security technology
    WhatsApp YouTube
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleCirrus Bridge: closing the gap in consultancy with an end-to-end approach
    Next Article South Africa seeks billions in climate funds even as it keeps coal plants open

    Related Posts

    iONLINE launches Sense Hub, simplifying IoT deployment

    iONLINE launches Sense Hub, simplifying IoT deployment

    18 November 2025
    iONLINE's new global network core delivers real-time connectivity control

    iONLINE’s new global network core delivers real-time connectivity control

    7 November 2025
    Starting local, growing global: iONLINE celebrates 20 years of innovation

    Starting local, growing global: iONLINE celebrates 20 years of innovation

    30 June 2025
    Add A Comment

    Comments are closed.

    Company News
    Galaxy S26 brings proactive AI, pro-grade video and a privacy breakthrough

    Galaxy S26 brings proactive AI, pro-grade video and a privacy breakthrough

    27 February 2026
    Cell C to SMEs: We'll be your partner, not just a provider - Cell C Business

    Cell C to SMEs: We’ll be your partner, not just a provider

    27 February 2026
    The data sovereignty paradox - Altron Digital Business

    The data sovereignty paradox

    27 February 2026
    Opinion
    The AI fraud crisis your bank is not ready for - Andries Maritz

    The AI fraud crisis your bank is not ready for

    18 February 2026
    A million reasons monopolies don't work - Duncan McLeod

    A million reasons monopolies don’t work

    10 February 2026
    The author, Business Leadership South Africa CEO Busi Mavuso

    Eskom unbundling U-turn threatens to undo hard-won electricity gains

    9 February 2026

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    Galaxy S26 brings proactive AI, pro-grade video and a privacy breakthrough

    Galaxy S26 brings proactive AI, pro-grade video and a privacy breakthrough

    27 February 2026
    Provinces ordered to enforce ban on online casinos

    Provinces ordered to enforce ban on online casinos

    27 February 2026
    Liquid secures nearly R10-billion in new funding - Liquid Intelligent Technologies

    Liquid secures nearly R10-billion in new funding

    27 February 2026
    Cell C to SMEs: We'll be your partner, not just a provider - Cell C Business

    Cell C to SMEs: We’ll be your partner, not just a provider

    27 February 2026
    © 2009 - 2026 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}