Bookkeeping Service Providers

  • Accounting
  • Bookkeeping
  • US Taxation
  • Financial Planning
  • Accounting Software
  • Small Business Finance
You are here: Home / IOT / A data heist: Less of a concern if it is on device

A data heist: Less of a concern if it is on device

June 12, 2020 by cbn Leave a Comment

The issue

In 2019, a Symantec security report found that around three quarters of all hacks were attempted on point-of-access devices such as routers. A mostly unsurprising fact given the scope of the access a hacker could obtain if he or she was able to compromise it, says Daniel Albertini, CTO, Anyline.

With that mostly common sense observation in mind, why do so many businesses still insist – in most cases completely needlessly – on sharing data via networks rather than simply processing data on device?

Think of scanning parts in a modern factory. An employee wants to add recently received stock into an inventory so he scans a serial number on the part using Optical Character Recognition (OCR) software on their mobile device to do so.

To scan the number of the part, that software is now sending data over the network to initiate the action of recognising the numbers – completing the process of scanning and digitising it. With the data that is being sent over the network exposed to any rogue agents who may have compromised the router being used.

So what?

While that case study may serve as a good example of the process, it is fair to say that most might argue exposing stock data is not the end of the world. So what if we turn to the far more sensitive topic: mobile scanning of identity documents.

Imagine a border control agency that has equipped its officers with a mobile solution to quickly scan passports and IDs. While this initiative may increase efficiency and improve accuracy vs. entering numbers manually to check documents, it runs into the same issue highlighted before.

To read the documents this software would have to send the information over Wi-Fi or mobile networks, thus exposing sensitive customer data to any hacker. This issue is then compounded by the fact that in order for your solution to work it must first send raw data outside of your organisation to be processed.

By sending information outside of your organisation, you could be putting your sensitive data in the hands of a third-party which may only be able to offer increased efficiency at such low costs because corners are being cut to do so in a competitive market. With cheaper solutions only offering OCR capabilities when connected to the internet.

The solution

In the examples above, these issues are caused by utilising software that is not capable of processing data on-device without needing a network. For some non-sensitive tasks this might be an acceptable trade-off for helping to speed things up at a lower cost, but when security is utmost, another solution is needed.

Implementing on-device processing can help to remove that need to send data away. When handling secure data, organisations such as border control can remain confident that the data is being processed on their own devices, with the added benefit of not needing a data connection.

While the benefits of utilising solutions such as Optical Character Recognition (OCR) are abundantly clear, the way it is implemented can have a huge impact on both the success and security of its use. Data provides organisations with power and OCR presents an opportunity to unlock further sources of that power through the digitisation of previously untapped information.

Investing in efficiency

OCR technology offers businesses huge opportunities when it comes to reducing human error, increasing efficiency and even reducing costs, but like all solutions, to truly gain value, businesses must invest in safe, class-leading solutions that do not cut corners and offer benefits without undue risk.

The author is Daniel Albertini, CTO, Anyline.

Comment on this article below or via Twitter: @IoTNow_OR @jcIoTnow

Share on FacebookShare on TwitterShare on Google+Share on LinkedinShare on Pinterest

Filed Under: IOT, SECURITY

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • May 2021
  • April 2021
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • March 2016

Recent Posts

  • FabCon Vienna: Build data-rich agents on an enterprise-ready foundation
  • Agent Factory: Connecting agents, apps, and data with new open standards like MCP and A2A
  • Azure mandatory multifactor authentication: Phase 2 starting in October 2025
  • Microsoft Cost Management updates—July & August 2025
  • Protecting Azure Infrastructure from silicon to systems

Recent Comments

    Categories

    • Accounting
    • Accounting Software
    • BlockChain
    • Bookkeeping
    • CLOUD
    • Data Center
    • Financial Planning
    • IOT
    • Machine Learning & AI
    • SECURITY
    • Uncategorized
    • US Taxation

    Categories

    • Accounting (145)
    • Accounting Software (27)
    • BlockChain (18)
    • Bookkeeping (205)
    • CLOUD (1,321)
    • Data Center (214)
    • Financial Planning (345)
    • IOT (260)
    • Machine Learning & AI (41)
    • SECURITY (620)
    • Uncategorized (1,284)
    • US Taxation (17)

    Subscribe Our Newsletter

     Subscribing I accept the privacy rules of this site

    Copyright © 2025 · News Pro Theme on Genesis Framework · WordPress · Log in