Articles by Todd Dunning
In today’s connected world, network intrusions and breaches have become a way of life, as hackers and cybercriminals work constantly to discover and exploit vulnerabilities. Because businesses of all sizes rely on their IT infrastructure to a growing degree, technology providers are working just as hard to stay ahead of would-be attackers. However, it’s difficult if not impossible to eliminate every potential threat. Therefore, it is highly likely that most organizations will suffer a breach at some point, introducing risks that can lead to business interruption, financial loss, reputational damage and more. How We View And Evaluate Cybersecurity In light of these realities and the potential fallout of network breaches, it is time to change the way we as an industry view and evaluate cybersecurity. Rather than seeing the technologies and practices for securing networks from a cost perspective, we must instead carefully consider the value of cybersecurity through the lens of the damage and potential liabilities of a breach caused by cybersecurity failures. Traditional cost-centered views of cybersecurity are not only outdated but are also inaccurate, as securing the network begins far before the implementation of a cybersecurity solution – with best practices including a number of basic precautions that do not require major investments. Security Passwords And Credentials One of the most effective measures security professionals can take to decrease the likelihood that an IP device will be a hacker’s point of entry to a network is also one of the most basic: change default passwords. But as straightforward and obvious as this may be, the truth is that many networked surveillance cameras and other security technologies deployed in the field are still using default settings. Some estimates put their number of these IP devices in the hundreds of thousands. The truth is that many networked surveillance cameras and other security technologies deployed inthe field are still usingdefault settings Cyber criminals know that there are websites dedicated to listing known default passwords for any number of branded IP devices, including cameras, access control hardware and more. This means these devices are essentially broadcasting to anyone who wants to put forth the effort it would take to access them. Not surprisingly, when hackers attempt to compromise a device, the first thing they try is the default password with an unbelievably high rate of success. The only reason this risk exists is because installers and/or end users far too often fail to take the incredibly simple step of creating new passwords for IP devices when they are deployed. This is both unacceptable and unnecessary. Segmented Surveillance Networks Another critical step organizations can take to protect their IP cameras, recorders and other security devices from intrusion is to isolate the security surveillance network from networks used for general operations. Physically or virtually separating your security surveillance network from the general, internet-facing network prevents hackers from accessing surveillance systems, helping to protect your valuable, sensitive information. For achieving this segmentation, virtual LANs are recommended. These networks separate traffic between surveillance systems and other devices on the network. Organisations can protect their security devices from intrusion by isolating the security surveillance network from general operations networks Physical Access Tampering Surprisingly, not all network intrusions are committed remotely by hackers using sophisticated technologies and methods to remotely gain access. Cybercriminals have considerable expertise in breaking into facilities and often begin their crimes with physical access to the systems they are looking to compromise. With physical access, individuals can reset any IP device to defaults, allowing new settings to be configured and security to be compromised. The first step in preventing this from happening is to install devices in locations where they cannot be reached easily, preferably within appropriate vandal-resistant housing that prevents physical access and damage. Tampering detection technology should also be employed to quickly detect any unauthorized access, and any cabling should be run through conduits or behind or through walls to prevent them from being unplugged or otherwise intercepted. This is also where the entire physical security program, from access control to guards to software, provides protection for itself in addition to protecting the organization’s premises and personnel. Monitored User Permissions Another technique for preventing unwarranted or unauthorized access to data and settings is for organizations to restrict user permissions for both local and remotely connections to networks or devices. A best practice for applying user permissions is the least privilege principle, which limits the features users may access to the minimum users require to perform their necessary functions. Additionally, any guest access to networks or devices should enable very limited functionality and access. It is imperative that security professionals and/or end users ensure surveillance systems are up to date Identify And Exploit Software Vulnerabilities A common approach hackers employ is to identify and exploit software vulnerabilities, relying especially on versions that have not been updated to improve security. Once a vulnerability has been found, it is quickly shared online, which opens the door for multiple individuals to easily access devices running outdated firmware and potentially gain access to the network itself. Recognizing this, software providers continually release updates that deliver improvements to close these open doors and protect users from unauthorized intrusions. However, no update can be effective if it isn’t installed, which is often the case, leaving devices and networks vulnerable to attacks. It is imperative that security professionals and/or end users ensure surveillance systems are up to date. All it takes is a few clicks to improve the cybersecurity protection of devices and networks. Effective Cybersecurity Tactics Unfortunately, network intrusions are here to stay and given the increasing sophistication of the tools and tactics hackers employ, the problem will only get worse. In the security industry, we must shift our view of cybersecurity away from costs and consider the value of preventing breaches. By employing some very basic but effective tactics, organizations can substantially increase the security of their networks and help to protect the sensitive data and assets they contain.
Pelco by Schneider Electric, a provider of intelligent video surveillance solutions, releases the Spectra Professional IR - a rugged camera ideal for transportation, city surveillance, airports, seaports and commercial markets. The Spectra Professional IR features ‘above the horizon’ viewing capability providing greater coverage of bridges, overpasses and building exteriors without mounting additional cameras. The camera also provides built-in IR illumination on areas of interest such as roadways, ports, parking lots and building perimeters up to 150 meters away offering a solution for customers who are frustrated with the inability of typical PTZ cameras to capture key image details in poorly lit environments. Spectra Professional IR also features a bubble-less design, a new feature to Pelco’s line of surveillance technology Typical Mounting Locations “With extensive research and development, Pelco has honed the technology to capture critical details in low light situations,” said Todd Dunning, Sr. Product Manager. “Spectra Professional IR also features a bubble-less design, a new feature to Pelco’s line of surveillance technology.” Assuring coverage of large areas, the Spectra Professional IR camera is designed for use in round-the-clock surveillance. Key features include: The Spectra Professional IR can view 15 degrees above the horizon that enables customers to see areas that are difficult to view when using typical mounting locations including bridge supports and cables, higher floors of commercial buildings as well as ships at a distance from seaport. Smart Compression Technology Primarily used for outdoor applications with poor lighting conditions, the IR technology allows operators to see details up to 150 meters away, where external visible lighting is not wanted or is unavailable. The technology also provides control of the illumination intensity and exposure in the camera; enabling people and vehicles to be tracked with clarity wherever they move in the field of coverage, near or far. Spectra Professional IR lowers bandwidth and storage requirements between 30 and 70 percent, depending on the amount of motion in the scene Featuring H.265 and Pelco’s Smart Compression technology, the Spectra Professional IR lowers bandwidth and storage requirements between 30 and 70 percent, depending on the amount of motion in the scene, especially important for 24x7 surveillance. Video Management Systems Reducing blurring associated with camera motion, this feature allows the camera to maintain a smooth image ideal for surveilling areas affected by high vehicle traffic or strong winds like bridges and light poles. Using only one wire to connect, the Spectra Professional IR comes with three power options and an embedded hinge design, making it easy to connect to and providing greater flexibility during installation. Seamlessly presented in video management systems allowing operators to easily track objects moving in the scene and zoom in for greater detail.
Solve Access Control Challenges in the Healthcare SectorDownload
Getting the Most Value From Software Subscription AgreementsDownload
The Role of Access Control in a Safe Return to the WorkplaceDownload
Shifting Trends in Operation Centers and Control Rooms for 2021Download