White House unveils "US Cyber Trust Mark" to help determine if your devices are secure

An American flag flying outside the US Capitol building against a blue sky
(Image credit: Getty Images)

  • The US Government is introducing a "Cyber Trust Mark" for consumer devices
  • Devices will have to meet criteria set by the NIST
  • This aims to build consumer trust in internet connected products

The White House has announced the ‘U.S. Cyber Trust Mark’, a labeling initiative looking to build trust in the consumer device market.

The Mark will act as an indicator that the product being sold has met the National Institute of Standards and Technology (NIST) cybersecurity criteria.

As ‘smart’ wireless internet connected devices have entered more homes across the country, so has the security risk that comes with hackable tech. Appliances and tech like home security systems, smart speakers, and internet connected kitchen or cleaning devices all present cybersecurity risks if compromised by threat actors.

A mark of confidence

After passing a bipartisan vote to authorize the program and trademark the shield logo that will be applied to products which fit the criteria, the FCC gave conditional approval to 11 companies as ‘Cybersecurity Label Administrators’, including Intertek Testing Services NA, and ioXt Alliance.

The criteria for the NIST standards includes strong default passwords, patching, data protection frameworks, and cyber incident detections. Firms like Best Buy and Amazon have expressed their support for the program, highlighting the opportunity to build consumer trust.

Not everyone is so enthusiastic about the initiative, with some concerned about the lack of rigorous testing for vendors, and pointing out that the mark does not include binding security requirements for vendors.

Whilst most agree the program is a step in the right direction, many of the security requirements are merely suggestions, as the entire program is voluntary. This may lead to inconsistency between vendors, and makes it unclear which companies are actually working to secure their devices.

Customers will scan a QR code on products with the safety mark to access information from an IoT registry, which is more convoluted than, for example, the FCC safety mark which one can assume is safe with a reasonable assurance.

You might also like

Ellen Jennings-Trace
Staff Writer

Ellen has been writing for almost four years, with a focus on post-COVID policy whilst studying for BA Politics and International Relations at the University of Cardiff, followed by an MA in Political Communication. Before joining TechRadar Pro as a Junior Writer, she worked for Future Publishing’s MVC content team, working with merchants and retailers to upload content.

Read more
A Wi-Fi router placed on a desk with cables going in. A hand is holding a padlock on top of the router.
Five Eyes shares fresh guidance for network edge device security
A hacker wearing a hoodie sitting at a computer, his face hidden.
I just learned something awful about my home Wi-Fi setup thanks to iFixit’s ‘worst of CES 2025’ awards
An American flag flying outside the US Capitol building against a blue sky
The FCC is creating a security council to bolster US defenses against cyberattacks
China
US government mulls entire TP-Link product ban - routers, switches and more all set to be blocked
A person holding out their hand with a digital AI symbol.
UK government releases new AI code of practice to help protect companies
Abstract image of cyber security in action.
TikTok’s American ownership rule ignores bigger IoT threat
Latest in Security
A graphic showing someone on a tablet working through a supply chain.
Security issue in open source software leaves businesses concerned for systems
ransomware avast
One of the most powerful ransomware hacks around has been cracked using some serious GPU power
person at a computer
Infamous ransomware hackers reveal new tool to brute-force VPNs
person at a computer
Many workers are overconfident at spotting phishing attacks
A fish hook is lying across a computer keyboard, representing a phishing attack on a computer system
Microsoft 365 accounts are under attack from new malware spoofing popular work apps
Data Breach
Thousands of healthcare records exposed online, including private patient information
Latest in News
Panos Panay and Alexa Plus
Amazon's Panos Panay teases future Alexa+ devices from speakers to possible wearables
Metroid Prime 4
I reckon the Nintendo Switch 2 could launch with Metroid Prime 4 – here’s why
Samsung Galaxy Z Fold 6
New rumors predict a foldable iPhone will launch next year – and cost almost twice as much as the iPhone 16 Pro Max
Pebble smartwatch countdown
Pebble confirms its smartwatch announcement is just hours away
Logo of YouTube Shorts
Is YouTube auto-playing Shorts when you open the app? Well, you’re not alone - here’s how to fix it
Google DeepMind panel discussion
“More sovereignty and protection” - Google goes all-in on UK AI with data residency, upskilling projects, and startup investments