As your kitchen becomes increasingly connected to the Internet, it becomes a bigger target for cybercrime. At The Spoon’s recent Smart Kitchen Summit, panelists who participated in a segment called Hacking the Oven: Cybersecurity and the Connected Kitchen identified three key takeaways to consider as your business adopts new devices to increase efficiency. First, cybersecurity can’t be something you bolt on to your business; rather, it’s important to make it flow through your operation from the start and to have a culture that values it. Second, both manufacturers and end users play a role in securing devices: manufacturers need to build secure devices with easy-to-install updates, and users need to do their part to protect devices with secure passwords. Finally, security is an ongoing process that requires manufacturers (and users) to have a plan to address vulnerabilities as they arise. Panelists expect to see cybersecurity certification labels on appliances in the near future – much like Energy Star rating stickers – to help end users better identify companies with strong cybersecurity records.
The number of internet-enabled devices is expected to reach 75 billion by 2025, or more than triple the number of such devices in use by the end of 2018, according to the technology firm ITProPortal. A technology-driven restaurant owner can adopt internet-enabled devices to monitor and manage everything from the operation’s food waste to its energy use. While these devices promise significant cost savings and efficiencies, their access to your data creates new points of vulnerability. It is increasingly difficult to prevent security breaches as threats become more sophisticated and employees who aren’t adequately trained leave a business exposed to threats. To help manage such threats, the tech security firm ControlScan advises operators to use next-generation firewalls to limit entry points for malware, and to use a managed security service provider that can identify vulnerabilities in a network, investigate and report security breaches, and troubleshoot other network security problems. Whether you outsource your network security or not, being able to keep tabs on your network in those ways is becoming increasingly important as businesses across sectors find that it’s not a question of if a security event will occur, but when.