top of page

Five Things to Know About Storing and Protecting Customers’ Information

  • chriswilliams401
  • Oct 4, 2023
  • 2 min read

Updated: Oct 5, 2023


Jon Cobb

Jonathan Cobb on the Imperative of Protecting Customer Information in the IoT Age

A Recent Interview with the Ayla Networks CEO Featured in Authority Magazine


In today's digital world, information is akin to currency. Every business—whether you're dealing in e-commerce, healthcare, or even manufacturing—is storing invaluable data. This data is a treasure trove for cybercriminals if not protected rigorously. David Leichner of Authority Magazine had the opportunity to sit down with Jonathan Cobb, CEO of Ayla Networks, to discuss what every business should be doing to store and protect their customers’ information. Read the interview here.


Five Pillars of Data Protection

Cobb outlined five essential points that every business needs to know to properly store and protect customer information:

  • Distinguish between PII and non-PII: Understand what constitutes personally identifiable information (PII) and what doesn’t. Tailor your data protection strategies accordingly to avoid regulatory penalties.

  • Access control: Don’t just store data; know who has access to it. Implement rigorous access controls to keep out unauthorized personnel.

  • Beyond encryption: While encryption is important, it’s not a cure-all. Incorporate it as part of a multi-layered security approach.

  • Learn from others' mistakes: Take heed from the massive privacy penalties incurred by tech giants like Amazon and Google. The financial and reputational risks are too high to ignore.

  • Continuous monitoring: Have strong preventive and detective controls around customer data. Continuously monitor and audit data access and usage to detect and prevent unauthorized activities.


Data Privacy from an IoT Perspective

Cobb emphasized the necessity of encryption and security standards, informed consent, and data minimization for IoT companies. He also highlighted international data transfers and compliance with regulations like GDPR, CCPA, HIPAA, and COPPA as critical for IoT businesses. But rather than just stitching together various tools for data management, Cobb recommends companies opt for a comprehensive IoT platform, like Ayla Networks, that offers an integrated solution for data protection and lifecycle management.


As privacy regulations continue to evolve, Cobb's insights serve as a robust framework for any business looking to safeguard its most valuable asset: customer data.


Read the interview here.

40 Comments


tamira2771
Dec 22, 2025

Interestingly, just as safeguarding sensitive information requires careful planning and attention to detail, creating a welcoming environment in your home demands a similar level of thoughtfulness. Protecting your customers’ data involves anticipating needs, ensuring security, and maintaining trust—principles that can also apply to how you design and plan your guest house. After all, whether it’s digital privacy or physical comfort, the goal is to create a space that feels secure, reliable, and inviting.

This connects to the concept of a new guest house because both endeavors—data protection and home design—benefit from foresight. Before adding a new guest house to your property, it’s essential to think about how guests will experience the space. Will it offer privacy? Is it functional for both short…

Like

tamira2771
Dec 22, 2025

Interestingly, just as safeguarding sensitive information is crucial for businesses, ensuring the safety, comfort, and efficiency of a workforce is equally important in industrial and construction environments. In both cases, planning ahead and implementing robust solutions can prevent potential risks—whether it’s data breaches or unsafe living conditions. This connection highlights the broader principle that proactive measures, whether digital or physical, are key to long-term operational success. Another factor to consider is the need for structured systems that simplify complex tasks: in IT, secure storage systems manage large volumes of customer information effectively; in construction and industrial projects, prefabricated solutions streamline the setup of living and working spaces without compromising quality.

This brings us to an area where modern engineering and…

Like

tamira2771
Dec 22, 2025

Interestingly, just as storing and protecting customers’ information requires a systematic and well-thought-out approach, managing operational tasks in a business also demands structured processes to ensure efficiency and accuracy. Work measurement plays a crucial role in this regard, much like robust data protection practices do in safeguarding sensitive information. Both concepts emphasize the importance of standards, consistency, and strategic planning to achieve optimal results. While data security focuses on protecting digital assets, work measurement techniques focus on protecting the organization from inefficiencies, waste, and misallocation of resources.

This connection becomes clearer when we consider that both areas involve observation, analysis, and application of standardized methods. In customer information management, organizations establish protocols, encryption standards, and access controls to ensure that data is…

Like

hardik seo
hardik seo
Dec 16, 2025

Interestingly, the principles of safeguarding sensitive information in the business world share a subtle connection with how the Indian judicial system safeguards the rights and interests of citizens. Just as organizations implement meticulous protocols to ensure that customer data remains secure and protected, the judiciary has established mechanisms to ensure that litigants have access to fair and just legal remedies. One such crucial mechanism in India is the Special Leave Petition (SLP), alongside the transfer petition, which together ensure that justice is not only served but also accessible under extraordinary circumstances.

Understanding the Special Leave Petition in Supreme Court is essential for anyone navigating the Indian legal landscape. Under Article 136 of the Constitution, an SLP / special leave petition allows an…

Like

hardik seo
hardik seo
Dec 16, 2025

After exploring the importance of safeguarding sensitive customer data, it’s interesting to note that protection isn’t limited to digital information alone. In many ways, the same care and awareness we apply to protecting information can also be applied to protecting our health—especially when it comes to everyday habits around food. This connects directly to another growing area of concern that affects families worldwide: dietary choices, sweet cravings, and their long-term impact on children’s well-being.

Modern lifestyles have significantly changed the way we eat, leading to increased sugar cravings, higher sugar consumption, and rising health concerns such as childhood obesity. Just as understanding risks is the first step in data security, understanding why we crave sugar and how it affects the…

Like
Ayla Networks Logo

IoT enabling the world's largest brands to connect any device, to any cloud, to any application

  • LinkedIn
  • Twitter
  • YouTube
Inc 5000 Award
Financial Times The Americas Fastest Growing Company Award

© 2026 by Ayla Networks, Inc.

Debug Info

Technology Fast 500 Award
bottom of page