IoT Device Cybersecurity: PSTI Act 2024, Default Password Rules and Advice Installers Should Give Clients

Quick Answer: The UK Product Security and Telecommunications Infrastructure (PSTI) Act 2024 (effective 29 April 2024) requires consumer IoT devices sold in the UK to meet three mandatory security requirements: no universal default passwords, a published vulnerability disclosure policy, and transparency about the minimum security update period. Installers should confirm that devices being specified carry UKCA marking or evidence of PSTI compliance, change any remaining default credentials at commissioning, and advise clients to update device firmware before handover.

Summary

Smart home devices — cameras, doorbells, smart locks, smart speakers, thermostats, and the routers and hubs that connect them — are among the most commonly compromised devices in UK household networks. Unlike computers and phones, which receive regular security patches and operating system updates, many IoT devices are configured once during installation and never touched again. Security vulnerabilities accumulate, firmware goes unpatched, and default credentials remain unchanged for years.

The PSTI Act 2024 established the UK's first binding legal framework for IoT device security. From April 2024, manufacturers, importers, and distributors of consumer connectable products in the UK are required to meet minimum security standards or face fines of up to £10 million or 4% of global turnover. This shifts legal responsibility towards the supply chain, but installers who specify and commission smart home equipment still have a duty-of-care obligation to clients to deliver a secure installation.

For residential tradespeople, the practical implication is straightforward: specify PSTI-compliant devices, change default passwords at commissioning, segment IoT devices onto their own VLAN, and hand the client a written record of what was installed, what credentials were set, and where to check for firmware updates.

Key Facts

Quick Reference Table

Spending too long on quotes? squote turns a 2-minute voice recording into a professional quote.

Try squote free →
Security Practice Why It Matters Installer Action
Unique device passwords Prevents bulk brute-force using leaked default credentials Change during commissioning; document securely
Firmware update Patches known security vulnerabilities Apply latest firmware before handover; enable auto-update
Network segmentation (VLAN) Compromised IoT device can't access personal data Implement IoT VLAN during network setup
WPA3 Wi-Fi Stronger encryption protects network access Configure WPA3 on IoT Wi-Fi SSID
Disable UPnP on router Prevents IoT devices from automatically opening firewall ports Disable in router admin settings
No port forwarding External attacks can't reach cameras/devices directly Use VPN or manufacturer cloud relay instead
Two-factor authentication Secures manufacturer cloud accounts for cameras, doorbells Enable on all manufacturer app accounts at handover
Documented credentials Client can update passwords and access devices after handover Provide handover document with all device access details

Detailed Guidance

PSTI Act: What Installers Need to Know

The PSTI Act primarily targets manufacturers, importers, and distributors. Installers who purchase from UK retailers and distributors are at the downstream end of the supply chain, but several implications are relevant:

Specifying compliant products: From April 2024, any new IoT device brought to market in the UK should be PSTI-compliant. However, pre-existing stock (pre-2024 manufactured products) may still be in distribution. When specifying products, verify that the manufacturer has published a PSTI compliance declaration (available on the manufacturer's website for compliant products).

Compliance evidence: The PSTI Act requires manufacturers to provide a Statement of Compliance. For products sold in UK retail, compliance should be assumed for purchases after April 2024 from reputable UK distributors. For grey-market or direct-import products (particularly from Chinese marketplaces), verify compliance independently.

Liability exposure: An installer who knowingly supplies and installs a non-compliant product could face OPSS enforcement action. More practically, if a non-compliant device is compromised and causes harm (e.g. a security camera is hacked and footage is accessed by an attacker), the installer may face civil liability for supplying inadequate equipment.

Commissioning Security Checklist

Follow this security checklist at commissioning for every smart home installation:

Before installation:

  1. Verify all devices are from reputable UK distributors and purchased post-April 2024 (or have confirmed PSTI compliance)
  2. Check manufacturer website for pending firmware updates; download latest firmware

During commissioning: 3. Change default admin passwords on all devices that allow it; set unique, strong passwords (minimum 12 characters, mixed case + numbers + symbols) 4. Change default Wi-Fi network names (SSIDs) from router-supplied defaults (e.g. "SKY12345") to a network name that doesn't identify the household 5. Create separate IoT Wi-Fi SSID (or VLAN) for smart home devices; give it a different password from the household Wi-Fi 6. Disable UPnP on the main router; check each device's admin interface for enabled port forwarding and disable it 7. Enable auto-firmware update on all devices that support it 8. Enable two-factor authentication on all manufacturer cloud accounts (camera apps, smart home apps, router admin)

At handover: 9. Provide a written handover document with: list of all devices installed; access credentials (stored securely — not in plain text email); instructions for firmware update checking; manufacturer contact details for security issues

Specific Device Security Concerns

IP cameras and doorbells: Historically the most compromised IoT category. Pre-PSTI budget cameras (Reolink, TuYa-branded, unbranded cameras) frequently had universal admin/admin or 123456 default credentials. Post-PSTI, verify unique default credentials or forced password change on first use. Advise against port forwarding for remote access — use the manufacturer's encrypted cloud relay or a client VPN instead.

Smart speakers (Amazon Echo, Google Nest): These devices capture audio in the home. The security risk is primarily the manufacturer's cloud infrastructure and data privacy rather than local network security. Advise clients about:

Smart locks: A compromised smart lock is a physical security issue, not merely a data issue. Verify the lock vendor has a strong security track record; prefer locks with offline code backup (ability to operate without connectivity); ensure the app account has 2FA enabled.

Smart routers/mesh systems: The router manages the entire network. Prioritise router security above all other devices: change admin credentials, keep firmware updated, enable WPA3, disable unused admin interfaces (Telnet, SSH if not needed), and use a strong, unique Wi-Fi password.

GDPR Considerations for Smart Home Cameras

Smart security cameras that capture images beyond the property boundary (public street, neighbour's garden) involve personal data processing under UK GDPR. While installers are not data controllers, they should advise clients:

See smart security camera installation and GDPR for detailed guidance on CCTV compliance.

Advising Clients: What to Say at Handover

Clients rarely think about IoT security beyond "does it work?" The handover conversation should include:

What to tell clients:

Frequently Asked Questions

Which types of devices are NOT covered by the PSTI Act?

Products excluded from PSTI requirements include: smart meters, large-scale connected industrial products, medical devices, vehicles, and products already covered by other security regulations (e.g. EV chargers, desktops, laptops). The Act focuses on consumer connectable products — devices sold to individuals for personal use in the home.

Can I still sell and install pre-2024 stock that may not be PSTI-compliant?

Manufacturers, importers, and distributors are responsible for compliance. Pre-2024 stock in legitimate UK distribution channels was legal when manufactured/imported and can continue to be sold through. However, given the liability risk of installing non-compliant equipment (particularly security cameras), installers should transition to confirmed-compliant products as existing stock depletes.

Does PSTI compliance mean a device is secure?

No — PSTI sets a minimum baseline (no universal default passwords, vulnerability disclosure policy, stated update period). Many compliant devices still have vulnerabilities in firmware, inadequate encryption, or insecure cloud backends. PSTI compliance is a floor, not a ceiling. Installers should additionally assess whether a manufacturer has a credible security track record.

What should I do if a client's existing device doesn't meet PSTI standards?

Document it in the handover and advise the client. If the device was installed before April 2024, it may be pre-PSTI stock. Recommend the client apply any available firmware updates, change default credentials, and consider replacement when the device reaches end-of-life. If the device has a known unpatched vulnerability, advise immediate replacement.

Regulations & Standards