Higher standards for IoT security from 2024

Share post

80 percent of cyber attacks are directed against wireless devices. The new extended EU RED directive enforces higher standards for IoT security from 2024.

The Internet of Things, ie all wireless intelligent devices in particular, represents one of the greatest risks in information technology. With new security requirements, the EU Commission is now significantly increasing the pressure on manufacturers, integrators and retailers of IoT devices - to protect companies and consumers .

New EU directive ensures more security

The new extension to the so-called RED (Radio Equipment Directive 2014/53 / EU) is to come into force EU-wide from 2024 and apply to all devices approved for sale in the EU. “We very much welcome the EU initiative. During tests in our laboratory, we often find serious weaknesses in almost all wireless devices. The spectrum ranges from routers to tablets, IP cameras, smart speakers, baby monitors and smart devices in company networks. Hackers can often use these devices to gain easy access to the local network, sensitive data and servers, ”says Jan Wendenburg, CEO of the IT security company IoT Inspector.

In addition to their own test laboratory, the security experts also operate the largest European platform for the automated checking of the firmware of IoT devices. This automatically and reliably detects security risks and compliance violations. According to Wendenburg, however, the inadequate specification of the directive is problematic. This makes implementation more difficult for manufacturers - although it should soon become binding for all manufacturers.

Hundreds of thousands of vulnerabilities are already in circulation

“Routers and numerous IoT devices are in use in corporate networks for up to ten years, in private households often even longer. The previous lack of obligation to ensure more security via firmware updates is an incalculable risk, ”says Jan Wendenburg from IoT Inspector. Just recently, IoT Inspector discovered serious security gaps in components from Realtek and Broadcom, which could spread to hundreds of thousands of devices from up to 65 well-known manufacturers due to a lack of transparency in the supply chain and product development. Among other things, routers, IP cameras, smart lighting controls and numerous other devices that are used in companies and households around the world are affected.

A security check must therefore take place during product development in order to identify and remedy potential weak points before the product is launched. With the IoT Inspector platform, product manufacturers and product integrators have a proven solution for automated security checks at their disposal, with which IoT firmware can be automatically monitored during the entire product life cycle. Integration into product development almost automatically reduces costs, resources, development time and project risks.

80 percent of cyber attacks target wireless devices

The EU Commission has shown that 80 percent of cyber attacks are already targeting wireless devices, making them a popular gateway for further damage in networks. Cyber ​​threats are evolving rapidly, the attacker's technologies are becoming increasingly complex and adapting to the circumstances better and better.

“Cybercrime has long since developed from the work of a few less organized hackers into a veritable business model for criminal organizations. It is difficult to estimate how the risk situation will develop in the coming months, ”warns Jan Wendenburg. In the new management report on IT security, the Federal Office for Information Security (BSI) assesses the current situation as "tense to critical", and in some cases the red alert is already in place. The increase over the past two years has been disproportionately high. It is therefore essential to be in a hurry to enable effective monitoring bodies such as testing and certification organizations to take corrective measures to increase IoT security on the basis of real results and analyzes.

More at IoT-Inspector.com

 


Via IoT Inspector

IoT Inspector is the leading European IoT security analysis platform and enables an automated firmware check of IoT devices for critical security gaps with just a few clicks of the mouse. The integrated compliance checker also detects violations of international compliance guidelines. Weak points for external attacks and security risks are identified in the shortest possible time and can be resolved in a targeted manner. The solution, which is easy to use via a web interface, reveals unknown security risks for manufacturers and distributors of IoT technology.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more