Newsletter Format Change – New & Existing Readers please note that:
- Not all items published in the last week are listed for each news source, but note that when you click on an item, scrolling down it will also display the last 7 day’s items for that channel (if item clicked on has less than 10 articles in that period, then the last 10 articles will be displayed regardless of date
- A news source may be listed in more than one section if the different items cover different topics (ex.; ScotGov may be listed in General …. & Health, …. & Policy…. & Consultation …. & ICT …. and Business …… sections
- We will try to ensure that we list at least one item per news source (if they have published any in the past week), but Readers are also reminded that using the ‘Search for Press releases’ Tab will provide access to them and to those published in previous weeks/months/years
Please choose from the links below to view individual sections of interest:
|Internet of Threats?|
By 2020, over 12bn consumer devices will be internet connected. From your smart meter to your smart TV, these IoT devices can bring a range of benefits to consumers like greater user experience & lower costs.
Concerns, however, have been raised about the poor security inherent within some of the connected consumer devices currently on the market and the lack of incentives for manufacturers to build security into the devices from the outset. Some of this is down to the lack of awareness amongst consumers of security weaknesses when buying devices, whilst others have argued that the multitude of standards & guidelines out there have made things too complicated for those creating IoT products & services.
That is why we at techUK were so keen to support the DCMS in its ‘Secure by Design’ review, since it sought to address these problems by:
The publication of the CoP is a watershed moment for the UK IoT and cyber security community. Developed in consultation with experts in government, industry & academia, the CoP outlines 13 guidelines that manufacturers of consumer IoT should implement into their product’s design to keep consumers safe & secure, ranging from the removal of default passwords to keeping software updated.
What has been refreshing about the development of the CoP has been the enthusiasm from a range of stakeholders to get this right. From manufacturers & retailers to consumer groups and trade bodies, there has been agreement that we have to move the burden of responsibility for ensuring the security of the devices away from the consumer to one where strong cyber security is built into consumer IoT products by design and consumers can easily set up & manage a device in a secure manner.The Government has also sought to make it easier for manufacturers to implement the Code by publishing a mapping document which links the 13 guidelines to existing standards, recommendations and guidance on IoT security & privacy from around the world, representing one of the largest collections of guidance on IoT security and privacy to date.
|Realising the benefits of technology|