Security

GCHQ's infosec arm has 3 simple tips to secure those insecure smart home gadgets

UK.gov tries the KISS approach to infosec advice for the public

By Gareth Corfield

75 SHARE

Britain's National Cyber Security Centre (NCSC) wants owners of baby monitors and smart CCTV cameras to take some basic security precautions.

The GCHQ-owned infosec arm of government today published what it hopes is simple guidance that can be followed by ordinary people who haven't got time to immerse themselves in the technobabble-laden doom and gloom of the cybersecurity world.

Dr Ian Levy, the NCSC's technical director, said in a canned statement: "Smart technology such as cameras and baby monitors are fantastic innovations with real benefits for people, but without the right security measures in place they can be vulnerable to cyber attackers."

Those security measures boil down to three steps in GCHQ's own words, which we reproduce here in full:

Caroline Normand, director of advocacy at consumer group Which?, chipped in to add: "Which? has repeatedly exposed serious security flaws with devices including wireless cameras and children's toys, so mandatory security requirements and strong enforcement that ensures manufacturers, retailers and online marketplaces are held accountable for selling insecure products is essential."

Jake Moore, cybersecurity specialist at ESET, said of the efforts: "Password managers should not be feared; many people think that putting all their passwords in one place on the cloud will make them somewhat vulnerable to attack. However, it's the opposite that is true. The clever use of two factor authentication, 2FA, and robust encryption are a far stronger mix than having to remember hundreds of accounts each with three random words."

The advice comes on the heels of proposed new laws that would force manufacturers to stop baking default passwords into new devices, provide a public point of contact for reporting security vulnerabilities and to state the product's useful lifespan, ie, for how long security updates will be published. Even those laws might not be enough to truly secure Joe and Josephine Bloggs, however.

Insecure smart home devices have long been known to techies as a rich source of vulnerabilities for criminals to exploit. In lawsuit-happy America, companies such as Amazon have had sueballs flung at them for perceived problems with security – and tried to fend these off with a "privacy dashboard" that largely fell flat among techies. ®

Sign up to our NewsletterGet IT in your inbox daily

75 Comments

Keep Reading

IoT security? We've heard of it, says UK.gov waving new regs

Department of Fun straps on a holster, strides into the wild west of online gadget users

IoT shouters Chirp get themselves added to Microsoft Azure IoT

Now your devices can join you in bellowing at Redmond's products

Internet of crap (encryption): IoT gear is generating easy-to-crack keys

Poor entropy in embedded devices leading to weaker certificates: study

Amazon straightens up its IoT house, complete with virtual Alexa, ahead of Las Vegas shindig

re:Invent Coffee machines will listen to you if vendors implement it

Dear makers of smart home things. Yeah, you with that bright idea of an IoT Candle. Here's an SDK from Amazon

Updated Management software for smart devices to ease entry into ecosystem

Hey, remember Microsoft's IoT Linux gear? After two years, Azure Sphere is finally here

Internet of Security is the name of the game, instead of that other 'S' word

Hanoi rocks for R&D – just ask Samsung: Chaebol starts work on $220m AI, IoT, 5G facility

Pandemic-dodging Sammy continues tradition of investment in Vietnam

SAP plugs IoT into Leonardo toolkit to woo big money industries

MWC Cloud-to-cloud interoperability with Microsoft, more vendors to come

Coin-mining malware jumps from Arm IoT gear to Intel servers

Exclusive Cryptocurrency crooks look to siphon cycles from enterprise kit

Behold the Internet of Turf: IoT sucks waste energy from living plants to speak to satellites

Surely only a matter of time before the Matrix has you?

Tech Resources

Google Security Whitepaper

This paper outlines Google’s approach to security and compliance for Google Cloud, their suite of public cloud products and services.

Perioden-Abschluss In Wachstumsstarken Unternehmen

Beim Schließen der Bücher die Lücken schließen.

The Highly Effective CFO

The highly effective CFO succeeds not because they embrace innovation, but because they use it to achieve the organisation’s financial and business goals.

Forrester: The Balanced Security Imperative

Download this Forrester study to discover the security trends and technology needed to protect employees, as well as practical steps to achieve the balanced level of security in your organization.