Tech firms sign up to government's IoT code of practice

HP, Samsung and Centrica Hive first to sign up to voluntary guidelines for Gov's 'Secure by Design'

IoT

Tech firms including HP, Samsung and Centrica Hive are the first to sign up to the UK government's voluntary security guidelines for IoT consumer devices.

Published by Department for Media, Culture and Sport (DCMS), the Code of Practice is a voluntary set of measures to help manufacturers boost the security of internet of things (IoT) devices by ensuring that security is embedded into the design process.

The code is made up of 13 guidelines, laid out in the government's 'Secure by Design' review published by the DCMS and the National Cyber Security Centre (NCSC) in March. Initially, the review was criticised by tech experts for 'lacking teeth' due to it being optional.

However, the code has already received support from high ranking tech firms, such as electronics giant Samsung. The company's director of IoT and SmartThings, Teg Dosanjh said that security and privacy in connected devices were of great importance to consumer trust and that the government's desire to make connected devices as safe and secure as possible was "warmly welcome".

Advertisement
Advertisement - Article continues below

"From smartwatches to children's toys, internet-connected devices have positively impacted our lives but it is crucial they have the best possible security to keep us safe from invasions of privacy or cyber attacks," said Minister for Digital, Margot James.

"The UK is taking the lead globally on product safety and shifting the burden away from consumers having to secure their devices."

James added that pledges by HP and Centrica Hive Ltd were a welcome first step but warned that it was vital other manufacturers followed their lead and ensured strong security measures were built into everyday technology during its design.

By making security a part of the design, tech companies can take the burden of securing devices away from consumers, who would otherwise have to add it on as an extra after purchase.

According to the government, there will be an estimated 420 million internet-connected devices in use across the UK within the next three years and these will range from smart technology, such as phones, TVs and speakers, to more innovative and obscure gadgets like as kettles and fish tanks.

Such devices have been exploited by malicious actors in a number of ways. A recent lab report from Kaspersky found that IoT malware had tripled in the first half of 2018, with attacks such as malicious cryptocurrency mining, DDoS attacks and botnet activities becoming more prevalent and harder for manufacturers to combat.

The government's move was welcomed by the cyber security community, with Duncan Jones, head of research at Thales eSecurity: "This kind of directive from the government, supporting security by design, is crucial to ensuring that our increasingly connected world is secure, and it's excellent to see large-scale tech companies committing to these efforts."

Featured Resources

The essential guide to cloud-based backup and disaster recovery

Support business continuity by building a holistic emergency plan

Download now

Trends in modern data protection

A comprehensive view of the data protection landscape

Download now

How do vulnerabilities get into software?

90% of security incidents result from exploits against defects in software

Download now

Delivering the future of work - now

The CIO’s guide to building the unified digital workspace for today’s hybrid and multi-cloud strategies.

Download now
Advertisement

Recommended

Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019
Visit/email-clients/19598/hotmail-outlookcom-upgrades-your-questions-answered
Software

Hotmail.co.uk migration to Outlook.com: Qs answered

11 Nov 2019
Visit/careers/28219/it-manager-job-description-what-does-an-it-manager-do
Careers & training

IT manager job description: What does an IT manager do?

28 Oct 2019
Visit/business-strategy/31780/the-it-pro-panel
Business strategy

The IT Pro Panel

28 Oct 2019

Most Popular

Visit/cloud/microsoft-azure/354230/microsoft-not-amazon-is-going-to-win-the-cloud-wars
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
Visit/cloud/amazon-web-services-aws/354223/what-to-expect-from-aws-reinvent-2019
Amazon Web Services (AWS)

What to expect from AWS Re:Invent 2019

29 Nov 2019
Visit/business/business-strategy/354252/huawei-takes-the-us-trade-sanctions-into-its-own-hands
Business strategy

Huawei takes the US trade sanctions into its own hands

3 Dec 2019
Visit/hardware/354237/five-signs-that-its-time-to-retire-it-kit
Sponsored

Five signs that it’s time to retire IT kit

29 Nov 2019