Critical security risks to IoT on cellular networks and how to handle them: A guide

If you take any risk when it comes to data, you need the CIA. The CIA, in this instance, is the 'confidentiality, integrity and availability' of that data. As such, IoT data transmission needs to be assessed for these risks. Cellular networks have long been considered a walled garden – a safe way to gain remote connectivity for your IoT devices. 

There is a ‘but’. Threat actors – competitors, governments, hackers for monetary gain (or for fun) – can ruin your...