



Establish an “Internet of Things” employee policy about what can and cannot be used in the office or used to access your network.Īttracting trouble while social networking with customers. Small business New Year’s resolution: Consider the sensitivity of information accessed and stored via wearable tech in the workplace. This poses serious and potentially debilitating problem for small businesses. Many of the companies building gadgets that connect to the Internet don’t even realize they have an oncoming security problem and therefore don’t have a friendly end-user method to patch these new vulnerabilities or notify customers when there is a vulnerability. Security researchers have already demonstrated attacks against smart televisions, medical equipment, baby monitors and security cameras. With millions of devices connected to the Internet-and in many cases running an embedded operating system-expect more hackers to be hacking in 2014. Our devices are getting smarter and so must we. The “Internet of Things” becomes the “Internet of Vulnerabilities” for Small Businesses Be transparent about why you’re collecting certain data, and you’ll establish a more trusting relationship with your customers. Small business New Year’s resolution: Consider the information you’re collecting on your consumers and whether it is necessary. You’ll also see a resurgence of users adopting aliases and fake names on social networking sites to protect their privacy. Expect Tor, which enables online anonymity, to become a popular application across the spectrum of Internet users. But this new feature will inevitably spark a debate on whether or not these features actually provide real or meaningful privacy protection. In 2014, we expect to see privacy protection emerge as a feature in new and existing products. In 2014, we will see continued consumer emphasis on privacy and the growth of Internet of Things and mobile, which will have a direct impact on small businesses and they way they do business.įrom scary headline news to a much needed wake-up call, consumers and small businesses are becoming more mindful about the amount of personal information that’s shared and collected on a daily basis. Small businesses can benefit greatly by using the latest technologies to improve operational efficiency and innovation, but they can also open the door to a host of headaches.
