Product Security a Smart Move
Product Security a Smart Move Doorbells, TVs, baby monitors and routers are among the many smart devices that are now commonplace in our homes. However, unless protected by strong passwords, these everyday items present a security risk. To increase consumer confidence and protection, a new product security law came into force on Monday 29 April, […]
Product Security a Smart Move
Doorbells, TVs, baby monitors and routers are among the many smart devices that are now commonplace in our homes. However, unless protected by strong passwords, these everyday items present a security risk. To increase consumer confidence and protection, a new product security law came into force on Monday 29 April, the Product Security & Telecommunications Infrastructure Act (PSTI).
Weak Passwords a Product Security Risk
Weak passwords are one of the major vulnerabilities of any internet-enabled device. A 2022 Which? investigation* revealed that everyday smart devices, including fitness trackers and mobile phones, are exposed to thousands of hacking attempts every week.
No matter what the level of product security, using a manufacturer’s default or generic ‘admin123’ ‘password’ or ‘12345678’ makes it easy for hackers to guess and exploit the technology. Therefore, the new PSTI act requires manufacturers to:
- Ensure devices are secure
- Prompt users to use strong passwords as part of the setup process
- Provide a point of contact for users to easily report bugs or vulnerabilities in product security
If no compliance products are found on the market, they may be recalled and the company can face substantial fines. The aim is to make weak passwords and associated vulnerabilities a thing of the past.
What you need to know about PSTI
Firstly, if you manufacture smart devices, read these guidelines from the:
- National Cyber Security Centre – https://www.ncsc.gov.uk/files/Security-law-smart-devices-NCSC.pdf
- Office of Product Safety & Standards (OPSS) who will oversee compliance – https://www.gov.uk/guidance/regulations-consumer-connectable-product-security
Secondly, when you buy wearable, domestic or business technology, change any default to a strong password. If you keep it simple to help you remember, we recommend using a free password manager tool. This keeps your list of passwords securely stored, so you never forget your login details and can avoid the risk of weak passwords.
Thirdly, if your device is hacked, report it to the manufacturer and email OPSS.enquiries@businessandtrade.gov.uk. Making others aware can help patch vulnerabilities and prevent other users from experiencing the same issue.
IT Security
There are always new steps to take in the dance with technology and if you have concerns about business IT security, services help you keep pace. From assessing your current setup to ongoing and proactive IT security support, we’ve got your back.
Here is some further reading – https://www.which.co.uk/news/article/smart-products-from-the-biggest-tech-brands-easily-hacked-in-which-tests-az2Ne3k7FXT1
More in Tech, IT & Comms
CloudKubed announces exciting growth plans and officially opens new office space...
Tech for good company CloudKubed has recently moved into new larger office space at Witney Business & Innovation Centre (BIC) to accommodate their rapidly growing team and accelerate plans to make Oxfordshire a technology hub. The Mayor of Witney, Owen Collins, was invited to celebrate and officially open the new office space.
Guiding the Development of AI Systems
Guiding the Development of AI Systems Artificial Intelligence (AI) continues to transform how we live, work, interact and access services. There is potential for it to bring multiple benefits to the global population. However, this is balanced by significant concerns that AI systems could turn into a sci-fi nightmare. So, how can AI development be […]
Intertronics acquires Dyne Testing
~ Surface measurement business now a wholly owned subsidiary of Intertronics ~
From this author
Guiding the Development of AI Systems
Guiding the Development of AI Systems Artificial Intelligence (AI) continues to transform how we live, work, interact and access services. There is potential for it to bring multiple benefits to the global population. However, this is balanced by significant concerns that AI systems could turn into a sci-fi nightmare. So, how can AI development be […]
What is VOIP?
Voice over Internet Protocol (VoIP) is the technology that enables us to make calls using the internet, rather than landline. With an earpiece and microphone, the call experience is more or less the same, whether you use VoIP or analogue. However, when Openreach phases out the PSTN landline network through 2025, only VoIP will work. […]
Your Business Without IT
You are invited to take a moment to visualise what would happen if your IT infrastructure went down, your customer and supplier data was stolen and your intellectual property was compromised. With denied access to your systems and information, operations will come to an immediate standstill. Financial demands are made and there’s a risk that […]