• Privacy Policy
Monday, June 5, 2023
Data Centre & Network News
ADVERTISEMENT
  • Data Centres
  • Networking
  • Infrastructure
  • Data
  • Magazine
  • Media Kit
  • Events
  • SUBSCRIBE
  • Contact
No Result
View All Result
  • Data Centres
  • Networking
  • Infrastructure
  • Data
  • Magazine
  • Media Kit
  • Events
  • SUBSCRIBE
  • Contact
No Result
View All Result
Data Centre & Network News
No Result
View All Result

Keeping your data safe with smart meters

Jessica Foreman by Jessica Foreman
April 3, 2019
in Data, Security
19 2
0
Share on FacebookShare on Twitter

Industry experts have spoken out against claims that smart meter technology and customer data held within it is susceptible to hacking. 

Smart meters and their dedicated network for communicating with energy suppliers are in fact leading the way for data security and have been designed with GCHQ and the National Cyber Security Centre.

The biggest infrastructure upgrade of our generation has been at the forefront for data security and protection from the very beginning.

Key facts from the experts

  • The smart metering system is a dedicated network for communication with your energy supplier. The network is safe and secure, having been developed with GCHQ and some of the top minds in the country.
  • Smart meters do not use the internet and only ever store a household’s meter reading, tariff details and prepay balance. This means that no identifiable data is ever saved on your smart meter.
  • The secure network is dedicated to transferring very basic data from your smart meter to your energy supplier.
  • Many households won’t know that consumers own the data on their smart meter and they can decide how they want their energy supplier to process it.
  • Consumers can save money and energy suppliers are able to offer hints and tips on energy efficiency from analysing energy usage.

Expert comments

Ian Levy, Chief Technical director of National Cyber Security Centre

Dr Ian Levy, Chief Technical director of National Cyber Security Centre, says, “Security lies at the heart of the smart metering system and has been a key consideration at every stage of system development to ensure there are no ‘loopholes’.

“The system operates on a national scale and has been designed as a secure end-to-end system, not just a collection of meters, energy suppliers and other components that have evolved individually.”

Robert Cheesewright, Director of Corporate Affairs at Smart Energy GB, says,“Your smart meter is one of the most secure pieces of technology in your home. But compared to things like your mobile phone or your email account, the data it holds is incredibly simple. Even if someone could gain unauthorised access to your smart meter, there’s very little they could actually do with it.

“The technology behind Great Britain’s smart meter rollout is second to none, having been designed by some of the world’s top cyber security experts. Consumers can rest assured that when it comes to data security, smart meter technology is leading the way.”

Matthew Evans, Exec Director at Tech UK

Matthew Evans, Exec Director at Tech UK, comments, “The smart meter system has been designed with security in mind from day one. Industry and Government, including GCHQ, continue to test and improve this system to ensure the maximum level of security for customers data.”

Martin Jordan, Chairman, Network Exploitation and Defence Forum

Martin Jordan, Chairman, Network Exploitation and Defence Forum (NED Forum) adds,”Unlike your home computer, tablet or smartphone, smart meters are not connected to the Internet. Instead they communicate over a closed secure private network. This removes the threat posed by hackers and scam artist who actively try and steal your data on a daily basis.

“Unlike your social media account, smart meters do not hold your life history, your personal information or what you had to eat over the weekend. Smart meters simply measure how much energy you are using.”

Tags: CybersecuritydataSmart meters
Share8Tweet5Share1

Related Posts

Security: the top determinant for cloud vendor selection

Security: the top determinant for cloud vendor selection

June 1, 2023
38
Colt partners with Venari Security to protect against cyber risks

Colt partners with Venari Security to protect against cyber risks

May 24, 2023
54
Türk Telekom delivers DDoS protection services for customers

Türk Telekom delivers DDoS protection services for customers

May 23, 2023
53
Vultr and Domino Data Lab reduce AI time-to-value

Vultr and Domino Data Lab reduce AI time-to-value

May 19, 2023
62
Acronis simplifies endpoint security with new EDR solution

Acronis simplifies endpoint security with new EDR solution

May 19, 2023
54
Nebulon launches TripLine

Nebulon launches TripLine

May 10, 2023
41
Next Post
Survey reveals industrial priorities when it comes to adopting data and digitalisation in the offshore wind sector

Survey reveals industrial priorities when it comes to adopting data and digitalisation in the offshore wind sector

AI: The next technological revolution

AI: The next technological revolution

ADVERTISEMENT
GRC introduces HashRaQ MAX to enhance crypto mining
Cooling

GRC introduces HashRaQ MAX to enhance crypto mining

June 2, 2023
41
Telehouse Thailand celebrates the opening of its new data centre
Data Centres

Telehouse Thailand celebrates the opening of its new data centre

June 2, 2023
41

Head office & Accounts:
Suite 14, 6-8 Revenge Road, Lordswood
Kent ME5 8UD
T: +44 (0)1634 673163
F: +44 (0)1634 673173

Cooling

GRC introduces HashRaQ MAX to enhance crypto mining

June 2, 2023
41
Data Centres

Telehouse Thailand celebrates the opening of its new data centre

June 2, 2023
41
  • Privacy Policy

© 2023 All Things Media Ltd.

No Result
View All Result
  • Data Centres
  • Networking
  • Infrastructure
  • Data
  • Magazine
  • Media Kit
  • Events
  • SUBSCRIBE
  • Contact

© 2023 All Things Media Ltd.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Cleantalk Pixel
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.