IoT gadgets to be vetted for security
30 tech firms team up to poke holes in smart devices to beef up IoT security
More than 30 tech industry leaders including BT and Intel have joined forces to build the Internet of Things Security Foundation, which will examine devices for security flaws before they go to market.
"We want to make it safe to connect," John Moor, from the NMI industry group that helped launch the group, told the BBC. "That's what we are imploring our members to do."
He added: "It's a bit like the aviation industry - when it began, it had to reassure people it was safe to fly."
The IoT Security Foundation isn't the first to try to secure smart homes and other connected devices. Various frameworks have aimed to build in security at the design stage, while BuildItSecure.ly offers pro-bono security help to smaller IoT startups and BT offers an IoT hacking service to hunt for flaws.
The news was welcomed by some in the industry, including Mike Weston, CEO of data science consultancy Profusion.
"This is great news for businesses seeking to build products for the Internet of Things," he said. "By seeking to create a minimum standard for security this body will help to safeguard peoples' data and create a level playing field for technology companies.
However, he warned that vetting devices wasn't enough - protecting security means being respectful of user privacy, too.
"We have to remember that the IoT has the capacity to capture an unprecedented amount of data on consumers," he said. "Given that so many devices could be connected there are real risks to data security. Vetting devices will help to reduce this risk, however, companies working with these devices should also make moves to create ethical standards in relation to how they use data and inform consumers. Maintaining consumer trust is key to making the IoT a success."
How virtual desktop infrastructure enables digital transformation
Challenges and benefits of VDIFree download
The Okta digital trust index
Exploring the human edge of trustFree download
Optimising workload placement in your hybrid cloud
Deliver increased IT agility with the cloudFree Download
Modernise endpoint protection and leave your legacy challenges behind
The risk of keeping your legacy endpoint security toolsDownload now