Thursday, December 05, 2013

How to Safeguard/Recover from Issues of Cyber Threats to Surveillance Systems?

Security cameras are almost ubiquitous, capturing our activities, especially at work. You know who watches you. Do you know you can be watched even by hackers / unknown sources? Most surveillance systems such as the hidden camera, CCTV camera, etc. come with remote internet access enabled by default. These systems often have weak password security. Not all buyers are aware about these drawbacks or the need to disable the ‘default’ nature of remote internet access and securing the systems with strong passwords. This only facilitates hackers to remotely tap into the video feeds easily. There are numerous instances of surveillance systems being vulnerable to cyber threats and breakdowns.

Users commonly use a specific user accounts (eg. admin) that can be easily accessed by hackers. Those surveillance systems with automatic log-in and known default passwords are the most vulnerable to cyber threats. It is no surprise if the password of your security camera is cracked via brute force. This happens when the password is weak or added by default. Accessing live and recorded CCTV camera footage by hackers is no new phenomenon. Yes, even via hacking, the security camera can be redirected, especially the one that is adjustable.

 Tips to safeguard / recover from cyber threat issues
•    Ensure proper setup and configuration of the surveillance systems
•    Change default vendor passwords
•    Use strong passwords that cannot be easily cracked
•    Disable remote access of CCTV camera or hidden camera when not needed
•    Allow access to only trusted people
•    Add filtering or security layer to thwart any traffic from non-trusted computers from accessing the surveillance systems
•    Not expose the security camera to the Internet unless utterly necessary
•    Do not repeatedly maintain connections to a feed for more than 30 minutes
•    Scan the surveillance systems network regularly for any vulnerable systems.

Understanding the threat profile of the system according to your type of business, you can address an assortment of vulnerabilities your surveillance systems are prone to. This would help you identify the threats and accordingly follow recovery or safeguarding steps.

Installation of Surveillance Systems such as the hidden camera, IP security camera, CCTV camera, alarm systems, etc. is integral to industrial automation to ensure safety and security of the premise. But your security can be at stake via cyber threats. Ensure that you buy the right brands from the right industrial automation service provider. Proper setup and configuration of the surveillance systems does matter to ensure non-vulnerability to cyber threats and breakdowns.

No comments:

Post a Comment