IoT

Finland agency launches smart device infosec certification program

The National Cyber Security Centre Finland (NCSC-FI) within Finnish regulatory agency Traficom today kicked off a smart device certification program designed to inform consumers if certain products meet basic information security standards.

Devices that meet certification criteria, which are based on consumer Internet of Things standards from the European Telecommunications Standards Institute (ETSI), will receive an official label designating it as NCSC-FI-approved. In a press release, Traficom claims the program makes Finland the first European country to issue certificates for safe smart devices.

“The security level of devices in the market varies, and until now there has been no easy way for consumers to know which products are safe and which are not,” said Jarkko Saarimaki director of the National Cyber Security Centre Finland (NCSC-FI) at Traficom, in the release. “The Cybersecurity label launched today is a tool that makes purchase decisions easier by helping consumers identify devices that are sufficiently secure.”

The NCSC-FI commenced development of its Cybersecurity label in late 2018 in a pilot project involving smart device manufacturers Cozify Oy, DNA Plc and Polar Electro Oy. A label was granted to Cozify’s Hub for smart homes, DNA’s Wattinen smart heating system and Polar Ignite’s fitness smartwatch, the release states.

The post Finland agency launches smart device infosec certification program appeared first on SC Media.

News Wrap: Amazon Ring Risks, Stalkerware, and D-Link Router Flaws

Identity and Access Management

IT security you can trust

Identity and access management forms the backbone of any cyber security program. A well establishment IAM (Identity & Access Management) program delivers robust and efficient user identification, authentication, authorization and accountability (IAAA). Most of the cyber security breaches till date, occurred because of weak IAM programs. Diverse group of multiple systems require comprehensive IAM program that could facilitate smooth operations while protecting systems and networks from unauthorized access.

An IAM program that delivers value to business has the following characteristics:

Aligned

It is aligned with business objectives and IT security strategy

flexible

It is technology independent and is flexible with future technologies

ease of use

It facilitates users and is human friendly

efficient

It provides efficient audit capabilities

Transform the way you manage your business

IAM programs must be built on organization knowledge of its objectives, strategy, core operations and culture. As IAM program directly requires user interaction, it must be compatible with organizational culture and norms.

iam_image_1

IT security.org brings its years of experience of delivering cyber security services for your IAM program. Our cyber security consultants and technological experts can provide you technology independent services to implement enterprise wide IAM program.

Various services of IAM in which we can assist you are:

A solution for every business need

We offer a wide range of services within this category. Please contact us today to further explore the areas in which you can improve your IAM systems.

S18 IAM Design

We can help you to design your IAM solution so you can use the technology to provide identity management to control access to all digital assets.

S19 IAM Policies, Standards, Procedures And Guidelines

We can help you to create the technical documentation required to support your IAM solution.

About

IT Security.org are based in the UK, offering a range of IT security solutions ranging from compliance and risk management to testing, training and much more.

Follow Us

Contact Us

© Copyright ITSecurity.Org Ltd 2015-2019 All Rights Reserved. Company Registration Number:11208508. Registered office address: 27 Old Gloucester Street, Holborn, London, United Kingdom, WC1N 3AX. VAT Reg.299747227