Tech firms sign up to government's IoT code of practice

HP, Samsung and Centrica Hive first to sign up to voluntary guidelines for Gov's 'Secure by Design'

IoT

Tech firms including HP, Samsung and Centrica Hive are the first to sign up to the UK government's voluntary security guidelines for IoT consumer devices.

Published by Department for Media, Culture and Sport (DCMS), the Code of Practice is a voluntary set of measures to help manufacturers boost the security of internet of things (IoT) devices by ensuring that security is embedded into the design process.

The code is made up of 13 guidelines, laid out in the government's 'Secure by Design' review published by the DCMS and the National Cyber Security Centre (NCSC) in March. Initially, the review was criticised by tech experts for 'lacking teeth' due to it being optional.

However, the code has already received support from high ranking tech firms, such as electronics giant Samsung. The company's director of IoT and SmartThings, Teg Dosanjh said that security and privacy in connected devices were of great importance to consumer trust and that the government's desire to make connected devices as safe and secure as possible was "warmly welcome".

"From smartwatches to children's toys, internet-connected devices have positively impacted our lives but it is crucial they have the best possible security to keep us safe from invasions of privacy or cyber attacks," said Minister for Digital, Margot James.

"The UK is taking the lead globally on product safety and shifting the burden away from consumers having to secure their devices."

James added that pledges by HP and Centrica Hive Ltd were a welcome first step but warned that it was vital other manufacturers followed their lead and ensured strong security measures were built into everyday technology during its design.

By making security a part of the design, tech companies can take the burden of securing devices away from consumers, who would otherwise have to add it on as an extra after purchase.

According to the government, there will be an estimated 420 million internet-connected devices in use across the UK within the next three years and these will range from smart technology, such as phones, TVs and speakers, to more innovative and obscure gadgets like as kettles and fish tanks.

Such devices have been exploited by malicious actors in a number of ways. A recent lab report from Kaspersky found that IoT malware had tripled in the first half of 2018, with attacks such as malicious cryptocurrency mining, DDoS attacks and botnet activities becoming more prevalent and harder for manufacturers to combat.

The government's move was welcomed by the cyber security community, with Duncan Jones, head of research at Thales eSecurity: "This kind of directive from the government, supporting security by design, is crucial to ensuring that our increasingly connected world is secure, and it's excellent to see large-scale tech companies committing to these efforts."

Featured Resources

Security analytics for your multi-cloud deployments

IBM Security QRadar SIEM solution brief

Download now

Five reasons to move to the cloud

Join the enterprises moving their workloads to the cloud

Download now

Architecting hybrid IT and edge for digital advantage

Why business leaders should consider a hybrid IT strategy

Download now

Six reasons to accelerate remote asset monitoring with AI

How to optimise resources, increase productivity, and grow profit margins with AI

Download now

Recommended

Lazarus APT hacking group is targeting the defense industry
Security

Lazarus APT hacking group is targeting the defense industry

26 Feb 2021
Microsoft open sources CodeQL queries used in Solorigate inquiry
Security

Microsoft open sources CodeQL queries used in Solorigate inquiry

26 Feb 2021
CISA warns of ongoing Accellion File Transfer Appliance attacks
hacking

CISA warns of ongoing Accellion File Transfer Appliance attacks

25 Feb 2021
What is a Trojan?
Security

What is a Trojan?

25 Feb 2021

Most Popular

How to build a CMS with React and Google Sheets
content management system (CMS)

How to build a CMS with React and Google Sheets

24 Feb 2021
Npower shuts down app after hackers steal user data
hacking

Npower shuts down app after hackers steal user data

25 Feb 2021
New monitors for an agile new normal
Sponsored

New monitors for an agile new normal

19 Feb 2021