Five Things to Know About Storing and Protecting Customers’ Information
- chriswilliams401
- Oct 4, 2023
- 2 min read
Updated: Oct 5, 2023
Jonathan Cobb on the Imperative of Protecting Customer Information in the IoT Age
A Recent Interview with the Ayla Networks CEO Featured in Authority Magazine
In today's digital world, information is akin to currency. Every business—whether you're dealing in e-commerce, healthcare, or even manufacturing—is storing invaluable data. This data is a treasure trove for cybercriminals if not protected rigorously. David Leichner of Authority Magazine had the opportunity to sit down with Jonathan Cobb, CEO of Ayla Networks, to discuss what every business should be doing to store and protect their customers’ information. Read the interview here.
Five Pillars of Data Protection
Cobb outlined five essential points that every business needs to know to properly store and protect customer information:
Distinguish between PII and non-PII: Understand what constitutes personally identifiable information (PII) and what doesn’t. Tailor your data protection strategies accordingly to avoid regulatory penalties.
Access control: Don’t just store data; know who has access to it. Implement rigorous access controls to keep out unauthorized personnel.
Beyond encryption: While encryption is important, it’s not a cure-all. Incorporate it as part of a multi-layered security approach.
Learn from others' mistakes: Take heed from the massive privacy penalties incurred by tech giants like Amazon and Google. The financial and reputational risks are too high to ignore.
Continuous monitoring: Have strong preventive and detective controls around customer data. Continuously monitor and audit data access and usage to detect and prevent unauthorized activities.
Data Privacy from an IoT Perspective
Cobb emphasized the necessity of encryption and security standards, informed consent, and data minimization for IoT companies. He also highlighted international data transfers and compliance with regulations like GDPR, CCPA, HIPAA, and COPPA as critical for IoT businesses. But rather than just stitching together various tools for data management, Cobb recommends companies opt for a comprehensive IoT platform, like Ayla Networks, that offers an integrated solution for data protection and lifecycle management.
As privacy regulations continue to evolve, Cobb's insights serve as a robust framework for any business looking to safeguard its most valuable asset: customer data.
Read the interview here.




Interestingly, the principles of safeguarding sensitive information in the business world share a subtle connection with how the Indian judicial system safeguards the rights and interests of citizens. Just as organizations implement meticulous protocols to ensure that customer data remains secure and protected, the judiciary has established mechanisms to ensure that litigants have access to fair and just legal remedies. One such crucial mechanism in India is the Special Leave Petition (SLP), alongside the transfer petition, which together ensure that justice is not only served but also accessible under extraordinary circumstances.
Understanding the Special Leave Petition in Supreme Court is essential for anyone navigating the Indian legal landscape. Under Article 136 of the Constitution, an SLP / special leave petition allows an…
After exploring the importance of safeguarding sensitive customer data, it’s interesting to note that protection isn’t limited to digital information alone. In many ways, the same care and awareness we apply to protecting information can also be applied to protecting our health—especially when it comes to everyday habits around food. This connects directly to another growing area of concern that affects families worldwide: dietary choices, sweet cravings, and their long-term impact on children’s well-being.
Modern lifestyles have significantly changed the way we eat, leading to increased sugar cravings, higher sugar consumption, and rising health concerns such as childhood obesity. Just as understanding risks is the first step in data security, understanding why we crave sugar and how it affects the…
Interestingly, just as businesses must carefully handle sensitive information to protect their customers, we also need to be mindful of what we “store” and consume in our bodies. Just as data security requires thoughtful measures, our dietary choices benefit from a balanced, informed approach. This connects to a growing trend in mindful eating, where traditional favorites are reimagined with health-conscious tweaks. One perfect example of this is the beloved North Indian snack — Dahi Vada.
Many of us enjoy dahi vada for its unique combination of soft lentil dumplings, creamy yogurt, and tangy chutneys. However, traditional recipes often come with a hidden challenge: dahi vada calories can quickly add up due to deep-frying and rich toppings. Some street-style versions can range…
<a href="https://www.google.com/">key</a>
gluten free egg noodles describes a plant-based oil derived from the seeds of Ricinus communis. Packed with ricinoleic acid, vitamin E, and essential fatty acids, this oil provides deep moisture for the skin, and supports overall wellness.