With the discovery of Internet of Things (IoT), there is a huge excitement and hype found among the masses. Some of them are also expressing concern over the question that whether this new invention could handle the existing challenges related to security and protection. The credibility is completely commendable. IoT implants sensors in almost all types of devices, with the aim of connecting the device with not only the internet but also enabling it to interconnect with the user and each other. It has been shown through a research that by 2020 there could be up to 30 billion devices connected to the internet. Internet of Things is growing in the industrial sector and technological advancement; there are growing concerns about the security and networking threats. These concerns will increase with the passage of time if the makers of IoT want more clients for its usage.

A survey shows that majority of the people living in European countries are interested in purchasing smart phone appliances, but at the same time, this surveys also displays that they are worried about the security risk related to Internet of Things. People’s mind still not forget the recent hack on Sony, connecting numerous item to the internet only permit the entry paths for the attackers to gain more sensitive and confidential information.

The security related to IoT is a serious issue, both at home or in the workplace. As the time passes, the availability and easy access to IoT become easier for cybercriminals to acquire information from it.

One of the biggest risks came from the devices itself, as well as the platform by which these devices are supported, because many of the devices are built on open source libraries, which has continuously depicting weaknesses.

The second risk is the different choices of quality available for IoT. This means you get what you pay for. Cheaply manufactured products are at greater risk due to low software coding. The only key is good development practices by the sales person. These systems should contain strict and continuous testing program to counter errors and problems rapidly. Another IoT security threat originated from the device working or its functioning. Example: Locking door, stimulating smoke alarm or video camera, these types of functions are more likely to be attacked by the invaders that are suspecting for vulnerability.

The other threat evolving around IoT is not with the device but related to the place where it is used and how it is used. However, when buying these devices seem extraordinary efficient, it becomes worse when using it during an organization network.

When talking about the device connectivity to the computer network, the information technology department should provide clear, enforced change control and technology related guideline. In this way, all departments within an organization will easily communicate with each other and will be familiar with new technology implanted in any department, and better security and stability will be ensured in the entire business resource.