“If you’re looking to deploy IoT, you need to do it right from the start and you need to think about what happens with that product throughout its lifetime, until you sunset it,” David Rogers MBE – founder of Copper Horse and author of the UK’s Code of Practice for Consumer IoT Security – told listeners at yesterday’s launch webinar (available to watch on-demand). “That means working with suppliers and partners who you can trust will take the right approach to security and platforms.”
Arm commissioned Copper Horse to offer an impartial guide to IoT security by design, and the 19 page white paper guides readers on how to appropriately and securely manage solutions at scale.
“If you’re deploying IoT in any kind of environment – for example, consumer, automotive, agricultural, industrial or medical, you need to consider security from the beginning,” David reiterates. “Regulation is coming so it can’t be ignored.”
Topics covered in the briefing include: the threat landscape; future regulation; software updates and device management; public key infrastructure (PKI); end-of-life and decommissioning; and a reminder on identifying and eliminating bad practices.
Full details can be found at – https://learn.arm.com/securingiotbydesign.html.
We’re pleased to be able to say that we have produced a free-to-download leaflet on mobile phone security, entitled “What risks are you taking?” The leaflet, which is available for download as a regular pdf or print-ready pdf file, provides advice on how to use a mobile phone safely and securely. It includes a section on the main threats that users need to be aware of when using their mobile device including via mediums like WiFi and the phone’s browser, things that many users will not have considered when using their phone.
The leaflet continues to provide advice on topics including personal safety (for example avoid using your device whilst driving), lost or stolen devices and securely using your phone (e.g. always review the permissions before the installation of an app). Additionally, there are some more general guidelines provided in a further section of advice for the reader.
This leaflet would be useful to any owner of a mobile device, as it shows the reader the many ways in which a phone and personal security could be compromised. In a time when individuals store more and more of their lives on their devices, being aware of the threats out there and knowing how to deal with them has never been so important. The leaflet can be downloaded from the resources page of this site.