How do we deal with cybersecurity challenges facing video security systems today?


Cameras are often physically exposed to the elements, which poses a physical risk of leaving ethernet cables exposed. The ever-increasing use of cloud technologies, AI, and IoT (Internet of Things) poses another high risk to systems. So what are the highest risks to video security systems?

Often its the lack of preventative measures deployed during and post-installation that create the highest risk. Often we see it’s the basics that are missed;  Minimum Password Length, Passwords Complexity

Passwords: All Default username/password combinations should be changed without fail, enabling strong password requirements; Maintaining a minimum password length, Applying some complexity with characters and or symbols, Limit Password attempts, and if possible use Multi-Factor Authentication

User Privileges: Setting user privileges that are essential to their functions only. This reduces the threat of manipulation “from inside”.

Updates and patches: Software updates are important to your digital safety and cyber security. Software updates often include repairs to security holes that have been discovered and fixed or computer bugs removal. Hackers love security flaws, also known as software vulnerabilities, take advantage of the weakness by writing code to target the vulnerability.

Outdated system components: We should always consider whether it might be better to replace components even if they are still fully functional but offer no more security updates. Vulnerabilities in the communication protocols used by millions of operational technology devices could allow cyber attackers to intercept and manipulate data.

Firewalls: Securing your firewall is securing your network and its devices, picking a good next Generation firewall, keeping it up to date, zoning your devices, and creating an access control list.

Encryption: Another important requirement today is network encryption, and this is especially relevant for traffic going over unsecured networks like the Internet or community networks.  All network traffic going over unsecured networks should be encrypted.

It’s essential to take a multi-layered approach to cybersecurity; we should always be safeguarding systems by using an array of technics and technologies; remember, nothing changes faster than the number and nature of cyberattacks.

Keep safe.