Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Leadership and ManagementCybersecurity News

Could a Device Labeling System Under the Trump Administration Lead to Better IoT Security?

By Erik Kangas
iot-enews
March 14, 2017

Recent developments in the cybersecurity sphere read like a dystopian novel. The devices we use for convenience and entertainment in our homes are being taken over for malicious purposes by forces unknown.

A number of significant hacker attacks have occurred in the past several months, many powered by the “smart” routers, gaming devices and thermostats that consumers envision as means to enhance their homes.

Malware can pollute these Internet of Things (IoT) devices, transforming them into nasty botnets – hijacked private devices that send spam and mass amounts of traffic to other computers without the user’s knowledge. In November 2016, those botnet-spammed targets included internet performance management company Dyn and French internet service provider OVH. When these targets go down, thousands of websites and internet connections fall in tandem.

What’s scary is that while dangerous malware continues to evolve, there is little will to improve the security of the IoT devices that are enabling these breaches.

We’ve reached a turning point in cybersecurity. The only way the situation is going to improve is with government intervention, mostly because neither consumers nor device sellers nor manufacturers seem willing or able to take up the fight.

This lack of action in regards to IoT cybersecurity has created an environment where there is the recognition that increased security is important, but since it’s not a juicy issue that carries much electoral sway, the will to change just isn’t there. The incoming Trump administration will have to take a leadership role in pushing for new regulation, even if there’s not a lot of voter will demanding it.

Government Efforts

The Obama administration made progress on cybersecurity, particularly with the creation of the Commission on Enhancing National Cybersecurity this past year. In December, the group released a report summarizing a nine-month study and proposed a number of recommendations. One is a new labeling system for devices that resembles the nutritional fact stickers on food. These labels would include a series of security ratings for devices, giving consumers the ability to compare device security and make better-informed purchasing decisions – ideally reducing the number of hacking vulnerabilities.

These new security ratings can be useful on devices, but only if – as the commission has suggested – these labels are created by an independent body that is externally reviewed. This costs money and takes political leadership, and it’s uncertain as to whether the Trump administration will adopt suggestions recommended by an Obama administration-commissioned study.

For his part, President Trump has been briefed by the commission on the importance of increased cybersecurity, as well as the recommendations of this new study. In his platform, President Trump promised an immediate review of all U.S. cyber defenses, though it’s unclear how much that review will affect IoT devices outside immediate federal agencies and departments. This too costs money, and we will have to wait and see where federal dollars will be spent when it comes to advocating for cybersecurity.

The Economics of Security

The nature of manufacturing technology creates another challenge. Regardless of the domestic solutions and efforts taken, we have no control over the regulation and scrutiny placed on technology that is made in Asia and sold in other parts of the world.

This is a challenge. While a device may never physically enter the U.S., it could still be used to take down websites domestically.

The best solution for cybersecurity involves a multifaceted, multi-party approach – creating an environment where effective security is incentivized for manufacturers and desired by consumers. In today’s context, incentivization translates to economic reward for good security. Basic economics tells us that if there is enough demand for something, suppliers will adapt to include that something in their products. Whether it takes encouraging consumers, suppliers, manufacturers, or all of the above, some reward must be developed to make secure devices more enticing.

These principles can be applied to security for internet-enabled devices. According to the United Nations Statistics Division, American consumers make up 29 percent of the world’s total consumer base. So while domestic demand may flag an issue to manufacturers, American interest alone will not provide the tipping point necessary to influence a manufacturer’s decision to beef up their devices’ security.

There is the potential for the United States to be the leader in convincing stakeholders in other major markets – namely Japan, Germany, France and the United Kingdom, which make up a further 22 percent of the international consumer market – to demand strong internet security regulations on devices. By creating markets where IoT devices can only be sold if they include sufficient security software, the demand for safer devices may be one that bears more bite. Not only that, but these software improvements would likely be included on all new devices, increasing cybersecurity globally.

Increasing the desirability for cybersecurity is no easy feat, and requires the involvement of several parties in both the United States and abroad. The security rating labels proposed by the Commission on Enhancing National Cybersecurity can play a role in putting security at the front of consumers’ minds. However, these labels will need to be reviewed and updated continuously. Just as the malware that invades our IoT devices, these efforts must be agile and ever-changing.

The mainstream media must increase its reporting on cyber attacks and, more importantly, the implications those hacks have on the lives of everyday Americans. The government too can work to make security more desirable through public awareness and education campaigns.

This is truly an area where the actions of a few countries can drive global change. While IoT devices can be useful and fun, we have to start treating the internet and its devices for what they really are: dangerous and vulnerable places that require careful control.

KEYWORDS: cyber risk mitigation cyber security threats Internet of Things (IoT) IoT Security security compliance security system integration

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

LuxSci founder Erik Kangas has an impressive mix of academic research and software architecture expertise, including: undergraduate degree from Case Western Reserve University in physics and mathematics, PhD from MIT in computational biophysics, senior software engineer at Akamai Technologies, and visiting professor in physics at MIT. Chief architect and developer at LuxSci since 1999, Kangas focuses on elegant, efficient, and robust solutions for scalable email and web hosting services, with a primary focus on Internet security. Lecturing nationally and internationally, Kangas also serves as technical advisor to Mediprocity, which specializes in mobile-centric, secure HIPAA-compliant messaging. When he takes a break from LuxSci, Kangas can be found gleefully pursuing endurance sports, having completed a full Ironman triathlon and numerous marathons and half Ironman triathlons.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • KimWyman.jpg

    Kim Wyman to join Biden Administration as CISA’s Senior Election Security Lead

    See More
  • Small Business, Science, and Tech Will Lead to a Better Future

    See More
  • computer keyboard

    Cyberattacks & security threats lead to IoT security market growth

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing