The issue in cybersecurity of securing various everyday devices that are now connected to the internet is being brought to the forefront for the first time. California Bill SB-327 is the instrument to do just that. Past events have brought awareness to the need for security on connected devices to be regulated and the bill is a first step. Critics have said the bill lacks the ability to affect change due to how it is written and what it regulates specifically. But other bills that have stagnated on the federal level would benefit from this legislation being passed. Despites its drawbacks and what change it may cause, the future of internet of things regulation depends on its passage.
Internet of things devices connect to the internet and thus are another avenue to a potential cyber attack. The largest threats reside in how a hacker can use compromised devices to attack larger networks and security systems. Gil Press from Forbes.com notes that effective strategies found to help with the identification and expulsion of IoT threats include monitoring data feeds, endpoint security software, encryption, and passwords (Press, 2017).
Press, G. (2017, March 20). 6 Hot Internet of Things (IoT) Security Technologies. Retrieved September 27, 2018, from https://www.forbes.com/sites/gilpress/2017/03/20/6-hot-internet-of-things-iot-security-technologies/#37ac966a1b49