Product Security a Smart Move
Product Security a Smart Move Doorbells, TVs, baby monitors and routers are among the many smart devices that are now commonplace in our homes. However, unless protected by strong passwords, these everyday items present a security risk. To increase consumer confidence and protection, a new product security law came into force on Monday 29 April, […]
Product Security a Smart Move
Doorbells, TVs, baby monitors and routers are among the many smart devices that are now commonplace in our homes. However, unless protected by strong passwords, these everyday items present a security risk. To increase consumer confidence and protection, a new product security law came into force on Monday 29 April, the Product Security & Telecommunications Infrastructure Act (PSTI).
Weak Passwords a Product Security Risk
Weak passwords are one of the major vulnerabilities of any internet-enabled device. A 2022 Which? investigation* revealed that everyday smart devices, including fitness trackers and mobile phones, are exposed to thousands of hacking attempts every week.
No matter what the level of product security, using a manufacturer’s default or generic ‘admin123’ ‘password’ or ‘12345678’ makes it easy for hackers to guess and exploit the technology. Therefore, the new PSTI act requires manufacturers to:
- Ensure devices are secure
- Prompt users to use strong passwords as part of the setup process
- Provide a point of contact for users to easily report bugs or vulnerabilities in product security
If no compliance products are found on the market, they may be recalled and the company can face substantial fines. The aim is to make weak passwords and associated vulnerabilities a thing of the past.
What you need to know about PSTI
Firstly, if you manufacture smart devices, read these guidelines from the:
- National Cyber Security Centre – https://www.ncsc.gov.uk/files/Security-law-smart-devices-NCSC.pdf
- Office of Product Safety & Standards (OPSS) who will oversee compliance – https://www.gov.uk/guidance/regulations-consumer-connectable-product-security
Secondly, when you buy wearable, domestic or business technology, change any default to a strong password. If you keep it simple to help you remember, we recommend using a free password manager tool. This keeps your list of passwords securely stored, so you never forget your login details and can avoid the risk of weak passwords.
Thirdly, if your device is hacked, report it to the manufacturer and email OPSS.enquiries@businessandtrade.gov.uk. Making others aware can help patch vulnerabilities and prevent other users from experiencing the same issue.
IT Security
There are always new steps to take in the dance with technology and if you have concerns about business IT security, services help you keep pace. From assessing your current setup to ongoing and proactive IT security support, we’ve got your back.
Here is some further reading – https://www.which.co.uk/news/article/smart-products-from-the-biggest-tech-brands-easily-hacked-in-which-tests-az2Ne3k7FXT1
More in Tech, IT & Comms
Storm Internet confirmed as B4’s Official Managed Web Hosting Partner
B4 announce their ‘Official Managed Web Hosting’ Partner – a multi award-winning organisation and long-standing B4 Member – Storm Internet. The partnership will see Storm Internet hosting B4’s website and becoming one of the Oxfordshire Business Summit sponsors.
The Ultimate Guide to Office Relocation – 9 -The Move Day...
The Move Day & Post-Move Actions Moving office is disruptive, so you need to be doing everything you can to mitigate relocation mistakes. Above all, allocate plenty of time for the move and don’t be too ambitious with what can be achieved in a day or two! If you have followed the guidance from our […]
The Ultimate Guide to Office Relocation – 8 – IT Specific...
IT-specific Considerations for an Office Move Let us present a list of things that we at Flex IT are regularly asked by clients who are moving offices. In some cases, advice is sought, in others, we are assigned responsibility for managing the IT side of relocation. Firstly, it’s very important to give your IT team […]