Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Wednesday, 6 December, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Cybersecurity Experts Put Burden of Hacking Protection on Device Makers, Not Users

by The Gurus
November 1, 2019
in Malware, Phishing and Ransomware, Opinions & Analysis
Mobile Security
Share on FacebookShare on Twitter

Two new reports from lead author Professor Nick Jennings of Imperial College London and other cybersecurity experts assert that device manufacturers have a larger burden to protect consumers from cybersecurity attacks than the device users themselves.

The report points out that although it’s important for users to be as proactive as possible in that regard, many people don’t know the most effective ways to do so.

It suggests using a safety mark system that acts as a guarantee that device manufacturers are protecting people from hackers and performing updates as needed.

It also brings up how government regulations could be imposed to force manufacturers to bring their cybersecurity practices in line with modern standards.

On the consumer side of things, this report recommends making good cybersecurity practices part of the grade school curriculum. This ensures people have early exposure to the things they need to do to keep themselves as safe as possible from hackers.

The report also mentions how people should keep their devices updated regularly.

Beneficial Devices With a Potential Dark Side

Information in the report clarifies that internet-connected devices have considerable potential for helping society, especially within the elderly and disabled populations.

However, it points out that hackers could take control of medical devices like pacemakers and diabetes management equipment and cause dangerous or fatal consequences.

Also, if a smart home includes lightbulbs or plugs, those could be used to spy on people or cause fires, respectively. Because many intelligent devices for residences detect patterns, cybercriminals could snatch data from some of them and learn when homes are typically unoccupied.

If manufacturers have to comply with these proposed protective measures, there are some industries and products likely to be especially affected. They’re covered in detail below.

1.       Medical Devices

The scenario mentioned above, whereby hackers could take control of medical equipment and cause it to malfunction and cause deaths, makes it particularly likely that if such regulations on smart devices exist, they will apply to medical equipment.

If people know such gadgets have a guarantee of safety from the manufacturers, they may be more likely to use them than if the makers did not give that promise.

Also, hospital representatives go through detailed processes when making purchasing decisions for their facilities. If some medical device companies refuse to take responsibility for protecting people from hackers, they’ll have trouble making sales to health facilities.

2.       Educational Gadgets

Schools are already using internet-connected devices to do things like track school buses and provide Wi-Fi that lets kids connect to the internet and do their homework in areas that ordinarily lack coverage. Facilities management becomes easier too, primarily because administrators can monitor energy usage or secure the premises while staying off-site.

If teachers make internet-connected devices part of school curriculums, the data collected rises significantly. This makes infiltration of educational tech products particularly attractive to hackers, especially when the data contains personal details like Social Security numbers.

3.       Smart Home Equipment

The report mentioned earlier discussed how hackers could break into homes filled with smart equipment and use those high-tech additions to invade privacy or cause risks to life and possessions.

Since many people now secure their homes with smart door locks, hackers are eager to figure out how to trick those gadgets. Even though most have integrated security measures to reduce the likelihood of that happening, some still fall short.

Such was the case with the Amazon Key system that allows a delivery person to enter a home and leave as a resident watches on a camera. There was reportedly a vulnerability that allowed a person to freeze the camera on a single frame and go back inside the house after it appeared they’d left.

A survey published by iQor revealed that about 70 percent of consumers are worried about their smart home devices getting hacked.

If manufacturers don’t start taking steps to prevent that and showing buyers how they have, the marketplace momentum currently enjoyed by smart home gadgets may start slowing down.

Consumers may decide that the lack of security they perceive with connected home devices is not worth the convenience.

It’s too early to say whether regulations for smart devices will arise and how soon they’ll impact industries.

Even if regulatory measures don’t get established for a while, manufacturers can still take a responsible approach to reduce the probability of cybersecurity breaches and prove they have applied those measures.

FacebookTweetLinkedIn
ShareTweet
Previous Post

Employees responsible for 35% of ICO data security incidents since 2015

Next Post

TaskRabbit has been brought back to life – Security industry opinion

Recent News

New Synopsys Report Reveals Application Security Automation Soars

December 5, 2023
Over 80% of IT Leaders Want to Move Their On-Prem PAM Solution to the Cloud

Over 80% of IT Leaders Want to Move Their On-Prem PAM Solution to the Cloud

December 5, 2023
Centripetal real logo

Centripetal Announces Partnership With Tiger to Provide Cybersecurity Innovation to the UK Market

December 5, 2023
Google bins inactive accounts

Google bins inactive accounts

December 1, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information