I O T The Internet Of Things
This page is “under construction” in that it is an area I am exploring and suffering some amazement as to how much I did not know (no surprises there then).
NarrowBand IOT - DATED IN 2015
https://www.3gpp.org/news-events/1733-niot
September 17, 2015, Phoenix, USA
A major milestone was achieved this week in RAN (Plenary meeting #69) with the decision to standardize NB-IOT, a new narrowband radio technology to address the requirements of the Internet of Things (IoT). The new technology will provide improved indoor coverage, support of massive number of low throughput devices, low delay sensitivity, ultra-low device cost, low device power consumption and optimized network architecture.
It sounds to me like current offers to building owners are continuing to be traditional BAC wired systems and these will have the following characteristics:
traditional hard- wired BAC (Building Automation and Control) systems are
costly to install, as I understand it the cost reduction is VAST, for example 10 Eur for ten years: https://1nce.com/en/pricing/ I have not tested this, but if true it compares to thousands (£8,000 for one building I know) of infrastructure wired costs not being required. The order process requires business to business only and is of German origin.
difficult to extend, and (difficult because building wiring is not easy)
inflexible when it comes to adding new functions that match evolving building use. (same reason as above, no plug and play here).
So why has a supplier not offered a modern solution?
Source:
resources.lora-alliance.org/smart-buildings/augmenting-bacnet-with-lorawan-wireless-iot
MORE DEPTH

http://lora-alliance.org/search-site/?_sf_s=British%20Telecom
Search for your desired suppliers, there are quite a few.
https://en.wikipedia.org/wiki/Machine_to_machine
LoRa is the de facto wireless platform of Internet of Things (IoT).
LoRaWAN®?The LoRaWAN open specification is a low power, wide area networking (LPWAN) standard based on Semtech’s LoRa devices, leveraging the unlicensed radio spectrum in the Industrial, Scientific and Medical (ISM) band. The http://www.lora-alliance.org/, a nonprofit association and fast growing technology alliance, drives the standardization and global harmonization of the LoRaWAN standard. LoRaWAN is recognized by the International Telecommunication Union (ITU) as an LPWAN standard.LEARN MORE |
LoRa Alliance®
The LoRa Alliance® is an open, non-profit association with the mission to support and promote the global adoption of the LoRaWAN® standard, the leading LPWAN.
Members collaborate in a vibrant ecosystem of device makers, solution providers, system integrators and network operators, delivering interoperability needed to scale IoT across the globe, using public, private, and hybrid networks.
Look for the LoRaWAN® certified mark on end-devices to ensure consistent performance of IoT sensors.
Buildings
LoRaWAN® has already become the de facto wireless protocol for smart buildings by providing low power, long range connectivity within large-scale commercial implementations. LoRaWAN® allows building managers, owners, tenants and service providers to view building functions remotely and ensure all the things within the building work in harmony.
It’s not all good read this:
https://duckduckgo.com/?q=iot+ransomeware+defences&ia=web
https://blog.cybermdx.com/3-ryuk-ransomware-defenses
https://www.itminister.co.uk/blog/ransomware-defense/
https://azure.microsoft.com/en-us/resources/azure-defenses-for-ransomware-attack/
I have had only BAD experiences with Trend Micro, however maybe you have not so:
https://www.trendmicro.com/vinfo/us/security/news/internet-of-things/iot-security-101-threats-issues-and-defenses
https://blog.trendmicro.ch/iot-and-ransomware-a-recipe-for-disruption/
Veeam_Ransomware_Retrospective.indd
Successful backups are the last line of defense for cyberattacks and can be the deciding factor to prevent considerable downtime, data loss and paying a costly ransom.
and from VEEAM to quote:
Veeam_Ransomware_Retrospective.indd
Mitigating ransomware attacks
End-user education (20%), bolstering backup storage resiliency (19%) and securing internet access (16%) are the top choices of ransomware mitigation globally. Similar results are seen from a geo perspective where NA, LATAM and EMEA/MEA are more apt to invest in detection, while NA was more likely to use additional network monitoring for mitigation.
To better mitigate ransomware vulnerabilities, customers are now focused on bolstering backup storage resiliency, through immutability, investing in end-user education and securing internet access.
MY OPINION
See above where it says “immutability?” It has seemed to me for some time that aside from totally offline (that means disconnected sitting on a shelf) this is the ONLY type of backup defence that can be viewed as likely to be effective. It looks like the experession “backup resiliency” (which means nothing at all unless defined) is used to mean “immutability”. Ok adding in to it expressions like “education” and “securing access” are not in my view backup methods, they are defences, for sure, but they are not part of backups. So my whole paragraph here reduces all online defences that are capable of being effective are solely only and nothing else except immutabilty. That means copying your data to a W O R M drive. And no one can have rights to that drive, bceause if someone physically steals it all is for nought. So it needs to be off site and in the cloud so no one actually knows where it is. In reality this leaves small businesses etc with Amazon S3 type storage as the only current provider I am aware of. Backblaze offers compatible resources.
All of that said I think what surprises me is the absence from common knowledge about immutable storage
W O R M stands for Write Once Read Many; so once written it can be read but never deleted (written again). That means “immutable”. I plan to have another look at Veeam, but I THINK they are not aimed at small biz.
Other Quoted from Intertrust paper
According to a study by the Ponemon Institute, 63% of CISO’s believe that participation in IoT will increase cybersecurity risks in the future8, and that over 80% of professionals predict that their organization will experience a catastrophic data breach caused by an unsecured IoT device.
The industry is still grappling with how to secure IoT deployments. A comprehensive security approach takes into consideration different technologies, policies, and processes. Organizations interested in exploring security standards for IoT can refer to (NISTIR) 82229, Industrial Internet Consortium10 and IoT Security Foundation11. These specify security frameworks for IoT and tell how to assess and improve their ability to prevent, detect, and respond to security incidents.
and I agree with this:
IoT is disruptive technology that is growing rapidly. However, without proper security, it will never reach its full potential.
I would add to that, that ordinary folk need access to all this tech without any massive uplift in prices. So that’s retail, but “IOT retail” - so to provide context for example one present business offer is ten years unlimited worldwide IOT cellular service for only ten Euros, just as an example to compare with the current 50 Euros per month type offers.