Cyber Trust Mark certification and how IoT devices qualify

<p>Consumer IoT device manufacturers have been gearing up to participate in an FCC program — the U.S. Cyber Trust Mark — that certifies they engineered their products to meet certain cybersecurity standards. The voluntary initiative is designed to validate the <a href=”https://www.techtarget.com/iotagenda/tip/5-IoT-security-threats-to-prioritize”>security of IoT devices</a> for consumers’ benefit. From a manufacturer’s perspective, IoT devices that earn the Cyber Trust Mark certification may have a competitive advantage in winning customer trust.</p>
<div class=”ad-wrapper ad-embedded”>
<div id=”halfpage” class=”ad ad-hp”>
<script>GPT.display(‘halfpage’)</script>
</div>
<div id=”mu-1″ class=”ad ad-mu”>
<script>GPT.display(‘mu-1’)</script>
</div>
</div>
<p>The Federal Communications Commission (FCC) set up the program as a public-private partnership. In late 2024, it named 11 companies as cybersecurity label administrators (CLAs) and Illinois-based testing firm UL Solutions as the lead administrator. &nbsp;</p>
<p>The program has said it expects to begin accepting applications for certification from IoT device makers by 2026, although an <a href=”https://www.cybersecuritydive.com/news/fcc-cyber-trust-mark-ul-investigation-delay/758507/”>investigation into UL Solutions and its ties to China might delay that timeline</a>. In the meantime, here’s what IoT device manufacturers need to know to prepare.</p>
<section class=”section main-article-chapter” data-menu-title=”How does Cyber Trust Mark certification work?”>
<h2 class=”section-title”><i class=”icon” data-icon=”1″></i>How does Cyber Trust Mark certification work?</h2>
<p>The U.S. Cyber Trust Mark logo will appear on wireless consumer IoT products that qualify for certification, along with QR codes that users can scan to access security information specific to the devices, such as the following:</p>
<ul class=”default-list”>
<li>How to <a href=”https://www.techtarget.com/searchsecurity/tip/Top-5-password-hygiene-tips-and-best-practices”>change default passwords</a>.</li>
<li>How to securely configure devices.</li>
<li>Information about accessing software updates and security patches, if they are not automatic.</li>
<li>The minimum support period, or th

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

This article has been indexed from Search Security Resources and Information from TechTarget

Read the original article: