{"id":28021,"date":"2015-12-18T10:30:23","date_gmt":"2015-12-18T10:30:23","guid":{"rendered":"http:\/\/www.zemsania.com\/?p=14272"},"modified":"2022-12-23T11:39:25","modified_gmt":"2022-12-23T11:39:25","slug":"internet-of-things-the-insecure-internet-of-things","status":"publish","type":"post","link":"https:\/\/zemsaniaglobalgroup.com\/en\/internet-of-things-el-internet-inseguro-de-las-cosas\/","title":{"rendered":"Internet of Things, the \u201cinsecure\u201d internet of things?"},"content":{"rendered":"<p>Internet of Things<span style=\"font-size: revert;color: var(--ast-global-color-3)\"> (IoT) or Internet of Things (IoT) is the new concept that is all the rage in the technological field. But what is IoT really? It is defined as \u201cphysical objects connected to the network that improve the user experience in everyday life and business processes in companies\u201d.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400\">Every day there are numerous articles talking about IoT and connected devices. Without going any further, the consulting firm Gartner forecasts that 4.9 billion connected objects will be in use in 2015 and the figure will reach 25 billion by 2020.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400\">However, a report by the <a href=\"https:\/\/www.pwc.se\/sv\/media\/assets\/consumer-intelligence-series-the-wearable-future.pdf\" target=\"_blank\" rel=\"noopener\">consulting firm PwC<\/a> shows that<\/span> in 2014, 86% of the respondents expressed concern about the <strong>security loopholes<\/strong> around connected devices, such as wearables, for example.<span style=\"font-weight: 400\">. When we talk about wearables, we are referring to devices such as smart watches, which are becoming increasingly important in our daily lives. The problem comes when the information (whether personal or business) jumps from wrist to wrist without any kind of filter.<\/span><\/p>\n\n\n\n<p>The approach of creating new usage policies for these devices is already a fact. If we go to any type of company (not only technology or telecommunications), we will see that it is connecting devices between them, such as smartphones, cars, consumer electronics, industrial sensors or even clothing so that they have access to the Internet in real time. This intercommunication and also the autonomy they present between them (machine-to-machine) generate a radical change in the modus vivendi of people, in addition to the huge economic impact on new business models.<\/p>\n\n\n\n<p><span style=\"font-weight: 400\">In this situation, we should ask ourselves a few questions: Who cares about security? Where does data privacy stand? Can we trust the data we receive? What would happen if <\/span><a href=\"http:\/\/gizmodo.com\/an-american-hero-hacked-an-amazon-dash-button-to-order-1733347471\"><span style=\"font-weight: 400\">hack<\/span><\/a><span style=\"font-weight: 400\"> our home or our company through IoT?<\/span><\/p>\n\n\n\n<h3 class=\"has-ast-global-color-0-color has-text-color wp-block-heading\">Can we trust the security of the Internet of Things?<\/h3>\n\n\n\n<p>A study of <a href=\"http:\/\/community.hpe.com\/t5\/Security-Products\/HP-Study-Reveals-70-Percent-of-Internet-of-Things-Devices\/ba-p\/6556284?jumpid=va_y92mxk3jtn#.VnLdflXxykp\" target=\"_blank\" rel=\"noopener\">HP<\/a> has evaluated 10 IoT home devices<span style=\"font-weight: 400\"> along with its cloud and mobile application components, and found that none of the systems require the use of a secure password and that 100 percent of them do not offer two-factor authentication. All these devices can identify us, define us and tag us. <strong>without our being aware of it<\/strong>. <\/span><\/p>\n\n\n\n<p>Let's take an example: Imagine that an IoT device is tracking the purchase and the truck that brings it to us. The simple fact of knowing the frequency and time with which we make the purchase of certain products can easily reveal that we are on a diet or that we suffer from some kind of food intolerance.&nbsp;<span style=\"font-weight: 400\">On the other hand, the dates on which we order can also reveal our religious tendency. For example, if we are Muslim and practice Ramadan or if we are Christian and buy a certain food at Easter.<\/span><\/p>\n\n\n\n<p>As mobile devices are increasingly used to interact with other elements, thanks to IoT, it will become imperative to verify the identity of mobile device users.<\/p>\n\n\n\n<p><span style=\"font-weight: 400\">In 2016 the trend will evolve from the <\/span><b><a href=\"https:\/\/es.wikipedia.org\/wiki\/Bring_your_own_device\" target=\"_blank\" rel=\"noopener\">BYOD<\/a><\/b><span style=\"font-weight: 400\"> (<\/span><b>Bring Your Own Device<\/b><span style=\"font-weight: 400\">) to <\/span><b><a href=\"http:\/\/searchsecurity.techtarget.com\/definition\/BYOI-bring-your-own-identity\" target=\"_blank\" rel=\"noopener\">BYOID<\/a><\/b><span style=\"font-weight: 400\"> (<\/span><b>Bring Your Own Identity<\/b><span style=\"font-weight: 400\">) including wearables, personal devices, clothing, etc., so users will need their own elements associated with their identity. &nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400\">To limit potential breaches and protect sensitive data, company policies and user privacy in general terms should dictate which products can be brought to work, which ones fall within the scope of security, which ones are allowed and what security they require.<\/span><\/p>\n\n\n\n<p>The security experts at <a href=\"http:\/\/www.unisys.es\/news\/News%20Release\/Nuevos-problemas-de-ciberseguridad-en-2015-segun-expertos-de-Unisys\" target=\"_blank\" rel=\"noopener\">Unisys<\/a> also portend an increase in security analytics and forensic tools to combat cybercriminals. Such tools can detect and respond to unusual network behavior, enabling organizations to act better and recover from cyberattacks faster. With the increasing use of infrastructure services <strong>cloud<\/strong>, In addition, IT security professionals will have a very difficult time segregating network traffic using traditional firewalls.<\/p>\n\n\n\n<p><span style=\"font-weight: 400\">The good news is that the technology industry has reacted and recognizes that there is a problem around IoT security. For example, the <\/span><i><span style=\"font-weight: 400\"><a href=\"http:\/\/www.iso.org\/iso\/home.html\" target=\"_blank\" rel=\"noopener\">International Standards Organization<\/a> <\/span><\/i><span style=\"font-weight: 400\">(ISO) is working on how the ISO 27000 family of security standards should be adapted to meet IoT needs, while the ISO 27000 family of security standards should be adapted to meet IoT needs, while the ISO 27000 family of security standards should be adapted to meet IoT needs. <\/span><i><span style=\"font-weight: 400\"><a href=\"http:\/\/standards.ieee.org\/\" target=\"_blank\" rel=\"noopener\">IEEE Standards Association<\/a> <\/span><\/i><span style=\"font-weight: 400\">is working on an architecture framework to address IoT security, privacy and governance issues.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400\">Data today are the new diamonds. All the information stored on our phone, or any connected device, is the new diamond. <strong>10 times more valuable than our card on the black market<\/strong>. We should start to raise awareness and think about how we can improve the security of our data. We have to be critical and take into account what we connect, how, and where we connect it to. The new digital era is a fact and we should take control of our lives.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Internet of Things (IoT) o internet de las cosas es el nuevo concepto que est\u00e1 de moda en el \u00e1mbito tecnol\u00f3gico. Pero \u00bfqu\u00e9 es realmente el IoT? Est\u00e1 definido como \u201cobjetos f\u00edsicos conectados a la red que mejoran la experiencia de usuario en la vida cotidiana y los procesos de negocio en las empresas\u201d. Cada [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":28022,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[2,3],"tags":[17,12,9],"class_list":["post-28021","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-noticias-zemsania","category-tendencias-it-digital","tag-bigdata","tag-cloud","tag-internet-of-things"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Internet of Things, \u00bfel internet \u201cinseguro\u201d de las cosas? - Zemsania Global Group<\/title>\n<meta name=\"description\" content=\"A pesar de que el Internet of Things es un claro avance, lo cierto es que la seguridad en los dispositivos IoT todav\u00eda deja mucho que desear\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/zemsaniaglobalgroup.com\/en\/internet-of-things-the-insecure-internet-of-things\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Internet of Things, \u00bfel internet \u201cinseguro\u201d de las cosas? - Zemsania Global Group\" \/>\n<meta property=\"og:description\" content=\"A pesar de que el Internet of Things es un claro avance, lo cierto es que la seguridad en los dispositivos IoT todav\u00eda deja mucho que desear\" \/>\n<meta property=\"og:url\" content=\"https:\/\/zemsaniaglobalgroup.com\/en\/internet-of-things-the-insecure-internet-of-things\/\" \/>\n<meta property=\"og:site_name\" content=\"Zemsania Global Group\" \/>\n<meta property=\"article:published_time\" content=\"2015-12-18T10:30:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-23T11:39:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2015\/12\/seguridad-IoT.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1100\" \/>\n\t<meta property=\"og:image:height\" content=\"607\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"jmarin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"jmarin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/internet-of-things-el-internet-inseguro-de-las-cosas\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/internet-of-things-el-internet-inseguro-de-las-cosas\\\/\"},\"author\":{\"name\":\"jmarin\",\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/#\\\/schema\\\/person\\\/0725e5e5b51900fbf2d344a650e9b75c\"},\"headline\":\"Internet of Things, \u00bfel internet \u201cinseguro\u201d de las cosas?\",\"datePublished\":\"2015-12-18T10:30:23+00:00\",\"dateModified\":\"2022-12-23T11:39:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/internet-of-things-el-internet-inseguro-de-las-cosas\\\/\"},\"wordCount\":908,\"publisher\":{\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/internet-of-things-el-internet-inseguro-de-las-cosas\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/wp-content\\\/uploads\\\/2015\\\/12\\\/seguridad-IoT.png\",\"keywords\":[\"BigData\",\"Cloud\",\"Internet of Things\"],\"articleSection\":[\"Blog\",\"Tendencias IT &amp; Digital\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/internet-of-things-el-internet-inseguro-de-las-cosas\\\/\",\"url\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/internet-of-things-el-internet-inseguro-de-las-cosas\\\/\",\"name\":\"Internet of Things, \u00bfel internet \u201cinseguro\u201d de las cosas? - Zemsania Global Group\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/internet-of-things-el-internet-inseguro-de-las-cosas\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/internet-of-things-el-internet-inseguro-de-las-cosas\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/wp-content\\\/uploads\\\/2015\\\/12\\\/seguridad-IoT.png\",\"datePublished\":\"2015-12-18T10:30:23+00:00\",\"dateModified\":\"2022-12-23T11:39:25+00:00\",\"description\":\"A pesar de que el Internet of Things es un claro avance, lo cierto es que la seguridad en los dispositivos IoT todav\u00eda deja mucho que desear\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/internet-of-things-el-internet-inseguro-de-las-cosas\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/internet-of-things-el-internet-inseguro-de-las-cosas\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/internet-of-things-el-internet-inseguro-de-las-cosas\\\/#primaryimage\",\"url\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/wp-content\\\/uploads\\\/2015\\\/12\\\/seguridad-IoT.png\",\"contentUrl\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/wp-content\\\/uploads\\\/2015\\\/12\\\/seguridad-IoT.png\",\"width\":1100,\"height\":607},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/internet-of-things-el-internet-inseguro-de-las-cosas\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/category\\\/noticias-zemsania\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Internet of Things, \u00bfel internet \u201cinseguro\u201d de las cosas?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/#website\",\"url\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/\",\"name\":\"Zemsania Global Group\",\"description\":\"Ofrecemos soluciones digitales innovadoras y talento IT especializado, siendo un referente para nuestros clientes y un partner tecnol\u00f3gico de confianza en los diferentes procesos empresariales.\",\"publisher\":{\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/#organization\"},\"alternateName\":\"Zemsania\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/#organization\",\"name\":\"Zemsania Global Group\",\"alternateName\":\"Zemsania\",\"url\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/logo-zemsania-horiz.svg\",\"contentUrl\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/logo-zemsania-horiz.svg\",\"caption\":\"Zemsania Global Group\"},\"image\":{\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/zemsania-global-group\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/#\\\/schema\\\/person\\\/0725e5e5b51900fbf2d344a650e9b75c\",\"name\":\"jmarin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ccd1d1e7c325f45d8d7d291c92a781dc6367e0692ac23375bf9ab738bd2a8eb2?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ccd1d1e7c325f45d8d7d291c92a781dc6367e0692ac23375bf9ab738bd2a8eb2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ccd1d1e7c325f45d8d7d291c92a781dc6367e0692ac23375bf9ab738bd2a8eb2?s=96&d=mm&r=g\",\"caption\":\"jmarin\"},\"sameAs\":[\"https:\\\/\\\/zemsaniaglobalgroup.com\"],\"url\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/en\\\/author\\\/jmarin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Internet of Things, the \u201cinsecure\u201d internet of things? - Zemsania Global Group","description":"Although the Internet of Things is a clear advance, the truth is that the security of IoT devices still leaves much to be desired.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/zemsaniaglobalgroup.com\/en\/internet-of-things-the-insecure-internet-of-things\/","og_locale":"en_US","og_type":"article","og_title":"Internet of Things, \u00bfel internet \u201cinseguro\u201d de las cosas? - Zemsania Global Group","og_description":"A pesar de que el Internet of Things es un claro avance, lo cierto es que la seguridad en los dispositivos IoT todav\u00eda deja mucho que desear","og_url":"https:\/\/zemsaniaglobalgroup.com\/en\/internet-of-things-the-insecure-internet-of-things\/","og_site_name":"Zemsania Global Group","article_published_time":"2015-12-18T10:30:23+00:00","article_modified_time":"2022-12-23T11:39:25+00:00","og_image":[{"width":1100,"height":607,"url":"https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2015\/12\/seguridad-IoT.png","type":"image\/png"}],"author":"jmarin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"jmarin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/zemsaniaglobalgroup.com\/internet-of-things-el-internet-inseguro-de-las-cosas\/#article","isPartOf":{"@id":"https:\/\/zemsaniaglobalgroup.com\/internet-of-things-el-internet-inseguro-de-las-cosas\/"},"author":{"name":"jmarin","@id":"https:\/\/zemsaniaglobalgroup.com\/#\/schema\/person\/0725e5e5b51900fbf2d344a650e9b75c"},"headline":"Internet of Things, \u00bfel internet \u201cinseguro\u201d de las cosas?","datePublished":"2015-12-18T10:30:23+00:00","dateModified":"2022-12-23T11:39:25+00:00","mainEntityOfPage":{"@id":"https:\/\/zemsaniaglobalgroup.com\/internet-of-things-el-internet-inseguro-de-las-cosas\/"},"wordCount":908,"publisher":{"@id":"https:\/\/zemsaniaglobalgroup.com\/#organization"},"image":{"@id":"https:\/\/zemsaniaglobalgroup.com\/internet-of-things-el-internet-inseguro-de-las-cosas\/#primaryimage"},"thumbnailUrl":"https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2015\/12\/seguridad-IoT.png","keywords":["BigData","Cloud","Internet of Things"],"articleSection":["Blog","Tendencias IT &amp; Digital"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/zemsaniaglobalgroup.com\/internet-of-things-el-internet-inseguro-de-las-cosas\/","url":"https:\/\/zemsaniaglobalgroup.com\/internet-of-things-el-internet-inseguro-de-las-cosas\/","name":"Internet of Things, the \u201cinsecure\u201d internet of things? - Zemsania Global Group","isPartOf":{"@id":"https:\/\/zemsaniaglobalgroup.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/zemsaniaglobalgroup.com\/internet-of-things-el-internet-inseguro-de-las-cosas\/#primaryimage"},"image":{"@id":"https:\/\/zemsaniaglobalgroup.com\/internet-of-things-el-internet-inseguro-de-las-cosas\/#primaryimage"},"thumbnailUrl":"https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2015\/12\/seguridad-IoT.png","datePublished":"2015-12-18T10:30:23+00:00","dateModified":"2022-12-23T11:39:25+00:00","description":"Although the Internet of Things is a clear advance, the truth is that the security of IoT devices still leaves much to be desired.","breadcrumb":{"@id":"https:\/\/zemsaniaglobalgroup.com\/internet-of-things-el-internet-inseguro-de-las-cosas\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/zemsaniaglobalgroup.com\/internet-of-things-el-internet-inseguro-de-las-cosas\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/zemsaniaglobalgroup.com\/internet-of-things-el-internet-inseguro-de-las-cosas\/#primaryimage","url":"https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2015\/12\/seguridad-IoT.png","contentUrl":"https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2015\/12\/seguridad-IoT.png","width":1100,"height":607},{"@type":"BreadcrumbList","@id":"https:\/\/zemsaniaglobalgroup.com\/internet-of-things-el-internet-inseguro-de-las-cosas\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/zemsaniaglobalgroup.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/zemsaniaglobalgroup.com\/category\/noticias-zemsania\/"},{"@type":"ListItem","position":3,"name":"Internet of Things, \u00bfel internet \u201cinseguro\u201d de las cosas?"}]},{"@type":"WebSite","@id":"https:\/\/zemsaniaglobalgroup.com\/#website","url":"https:\/\/zemsaniaglobalgroup.com\/","name":"Zemsania Global Group","description":"We offer innovative digital solutions and specialized IT talent, being a reference for our customers and a trusted technology partner in different business processes.","publisher":{"@id":"https:\/\/zemsaniaglobalgroup.com\/#organization"},"alternateName":"Zemsania","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/zemsaniaglobalgroup.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/zemsaniaglobalgroup.com\/#organization","name":"Zemsania Global Group","alternateName":"Zemsania","url":"https:\/\/zemsaniaglobalgroup.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/zemsaniaglobalgroup.com\/#\/schema\/logo\/image\/","url":"https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2024\/04\/logo-zemsania-horiz.svg","contentUrl":"https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2024\/04\/logo-zemsania-horiz.svg","caption":"Zemsania Global Group"},"image":{"@id":"https:\/\/zemsaniaglobalgroup.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/zemsania-global-group"]},{"@type":"Person","@id":"https:\/\/zemsaniaglobalgroup.com\/#\/schema\/person\/0725e5e5b51900fbf2d344a650e9b75c","name":"jmarin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/ccd1d1e7c325f45d8d7d291c92a781dc6367e0692ac23375bf9ab738bd2a8eb2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ccd1d1e7c325f45d8d7d291c92a781dc6367e0692ac23375bf9ab738bd2a8eb2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ccd1d1e7c325f45d8d7d291c92a781dc6367e0692ac23375bf9ab738bd2a8eb2?s=96&d=mm&r=g","caption":"jmarin"},"sameAs":["https:\/\/zemsaniaglobalgroup.com"],"url":"https:\/\/zemsaniaglobalgroup.com\/en\/author\/jmarin\/"}]}},"uagb_featured_image_src":{"full":["https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2015\/12\/seguridad-IoT.png",1100,607,false],"thumbnail":["https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2015\/12\/seguridad-IoT-150x150.png",150,150,true],"medium":["https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2015\/12\/seguridad-IoT-300x166.png",300,166,true],"medium_large":["https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2015\/12\/seguridad-IoT-768x424.png",768,424,true],"large":["https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2015\/12\/seguridad-IoT-1024x565.png",1024,565,true],"1536x1536":["https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2015\/12\/seguridad-IoT.png",1100,607,false],"2048x2048":["https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2015\/12\/seguridad-IoT.png",1100,607,false],"trp-custom-language-flag":["https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2015\/12\/seguridad-IoT.png",18,10,false],"cover":["https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2015\/12\/seguridad-IoT.png",834,460,false]},"uagb_author_info":{"display_name":"jmarin","author_link":"https:\/\/zemsaniaglobalgroup.com\/en\/author\/jmarin\/"},"uagb_comment_info":0,"uagb_excerpt":"Internet of Things (IoT) o internet de las cosas es el nuevo concepto que est\u00e1 de moda en el \u00e1mbito tecnol\u00f3gico. Pero \u00bfqu\u00e9 es realmente el IoT? Est\u00e1 definido como \u201cobjetos f\u00edsicos conectados a la red que mejoran la experiencia de usuario en la vida cotidiana y los procesos de negocio en las empresas\u201d. Cada&hellip;","_links":{"self":[{"href":"https:\/\/zemsaniaglobalgroup.com\/en\/wp-json\/wp\/v2\/posts\/28021","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zemsaniaglobalgroup.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zemsaniaglobalgroup.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zemsaniaglobalgroup.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/zemsaniaglobalgroup.com\/en\/wp-json\/wp\/v2\/comments?post=28021"}],"version-history":[{"count":0,"href":"https:\/\/zemsaniaglobalgroup.com\/en\/wp-json\/wp\/v2\/posts\/28021\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/zemsaniaglobalgroup.com\/en\/wp-json\/wp\/v2\/media\/28022"}],"wp:attachment":[{"href":"https:\/\/zemsaniaglobalgroup.com\/en\/wp-json\/wp\/v2\/media?parent=28021"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zemsaniaglobalgroup.com\/en\/wp-json\/wp\/v2\/categories?post=28021"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zemsaniaglobalgroup.com\/en\/wp-json\/wp\/v2\/tags?post=28021"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}