Protect Your Surveillance Cameras
Did you know cyber-thieves can breach your surveillance camera system if not secured correctly?
Surveillance Cameras serve as a point of entry into the IP network of organizations of all types. As an IP based device and without proper measures to protect them, hackers can use them to shut down surveillance or to tap into the organization’s data. Both represent real risks that need immediate attention.
The good news is that there are immediate, high impact measures that security professionals can implement and architect to ensure your camera system is safe & secure!
If you have cameras or you’re preparing to install a new system, here are some tips you should be educated on:
Camera Passwords ARE Important
If your security cameras still use the default manufacturer password or a weak, common password, you are at immediate risk for a security breach. Hackers can write programs that will attempt hundreds of passwords in the blink of an eye. If your passwords aren’t updated regularly with significant difficulty, you are making it even easier for hackers to take down your cameras.
Try utilizing a Secure Password Generator for creating strong passwords.
Lock Down your Network
Because cameras are often located in unsecured places around the perimeter of a building or in hallways, it is essential to ensure that your cameras are the only devices that can communicate across your network. Your network has a feature called MAC Binding that configures each network port to only accept the specific, unique MAC address from the camera bound to that port. This way, if a hacker tries to replace the camera with a laptop, the network will reject the communication. Seek tools to make this management easy and ability to upgrade.
Isolate Your Cameras
Don’t put cameras on the same corporate network as your workstations. Isolate your cameras with a Virtual LAN (VLAN) so that the only thing that can talk to them is the Video Management System (VMS).
Don’t Ignore Unusual Events
Take note of even short outages or sudden camera reboots. These small, seemingly insignificant events can indicate security breaches, such as foreign firmware uploads or hacker devices being introduced to the network.
Two Operators equals Less Risk
Your cameras should be set up with two logins the same way that your computers are set up; one login is a user with limited privileges, the other is an administrator with full access. The camera admin login should be used rarely for updates, and the user login should handle everyday tasks, like streaming video. That way, the more commonly used login cannot do as much damage if it falls into the wrong hands.
Purchase Cameras from Companies with a Reputation for Security
Not all camera brands are created equal. The security of certain brands and cameras with certain countries of origin have been questioned. Reputable companies should be on the forefront of security concerns, and have rapid response time to vulnerabilities. Do your research before a major system purchase.
For additional information on Secure Surveillance Cameras, please contact us below, we are always glad to assist!