1 min read

EU to Enforce Stricter Cybersecurity Regulations for IoT Devices and Software

Silviu STAHIE

September 20, 2022

Ad One product to protect all your devices, without slowing them down.
Free 90-day trial
EU to Enforce Stricter Cybersecurity Regulations for IoT Devices and Software

The European Commission is proposing the EU Cyber Resilience Act, a set of regulations that would redefine the rules surrounding cybersecurity and lead to more secure hardware and software products for end users.

In reality, many devices in customers’ hands right now don’t offer the necessary security or manufacturer support for the long run. Consumers are inundated with subpar devices rushed through development without security considerations, with the sole purpose of being first on the market.

One way to ensure user safety is to enforce regulations that prompt manufacturers to build products with cybersecurity in mind.

“The current EU legal framework does not address the cybersecurity of non-embedded software, even if cybersecurity attacks increasingly target vulnerabilities in these products, causing significant societal and economic costs,” explained the EU in the proposal.

“We deserve to feel safe with the products we buy in the single market. Just as we can trust a toy or a fridge with a CE marking, the Cyber Resilience Act will ensure the connected objects and software we buy comply with strong cybersecurity safeguards,” said Margrethe Vestager, Executive Vice-President for a Europe Fit for the Digital Age. “It will put the responsibility where it belongs, with those that place the products on the market.”

Manufacturers will have to ensure that hardware and software products arrive on the EU market with fewer vulnerabilities and they’ll have to fix newly discovered vulnerabilities as quickly as possible. Companies will also have to provide adequate support for their devices and offer consumers more information on cybersecurity before they purchase a product.

The EU Cyber Resilience Act should result in more transparency regarding cybersecurity and the support users can expect from hardware and software manufacturers. The European Parliament and the Council still need to examine the draft. Once adopted, companies will have two years to adapt to the new regulations if they want to sell their products in the European market.

tags


Author



Right now

Top posts

August Spam Debrief: Bitdefender Labs Warns of Fraud Campaigns Exploiting the Russia-Ukraine War

August Spam Debrief: Bitdefender Labs Warns of Fraud Campaigns Exploiting the Russia-Ukraine War

August 31, 2022

4 min read
Snake Keylogger Returns in Malspam Campaign Disguised as Business Portfolio from IT Vendor

Snake Keylogger Returns in Malspam Campaign Disguised as Business Portfolio from IT Vendor

August 30, 2022

2 min read
What is medical identity theft and how to protect against it

What is medical identity theft and how to protect against it

July 27, 2022

2 min read
Curious about Omegle? Here’s how the roulette-style chat platform can threaten your online privacy and security

Curious about Omegle? Here’s how the roulette-style chat platform can threaten your online privacy and security

July 07, 2022

5 min read
Identifying and Dealing with Online Bullying Is Not Impossible - School Presentation Inside

Identifying and Dealing with Online Bullying Is Not Impossible - School Presentation Inside

June 28, 2022

2 min read
Let’s Celebrate World Social Media Day by Improving Your Privacy and Security Online

Let’s Celebrate World Social Media Day by Improving Your Privacy and Security Online

June 28, 2022

3 min read

FOLLOW US ON

SOCIAL MEDIA


You might also like

Prison for ex-eBay staff who aggressively cyberstalked company's critics with Craigslist sex party ads and funeral wreaths Prison for ex-eBay staff who aggressively cyberstalked company's critics with Craigslist sex party ads and funeral wreaths
Graham CLULEY

September 30, 2022

2 min read
Honolulu Man Sabotaged Former Employer’s Network and Business Using Still-Active Credentials Honolulu Man Sabotaged Former Employer’s Network and Business Using Still-Active Credentials
Silviu STAHIE

September 30, 2022

1 min read
North Korean Gang Uses Compromised Open Source Software to Distribute Malware, Researchers Find North Korean Gang Uses Compromised Open Source Software to Distribute Malware, Researchers Find
Silviu STAHIE

September 30, 2022

1 min read