SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 Sets Sales Record In Security Market
    • A Landmark Gathering Shaping The Future Of Real Estate, Investment, Sustainability & Design
    • IDIS Launches New AI PTZ Cameras With NIR Performance
    • Leuze AI Boosts Optical Distance Sensor Accuracy
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    • How Should Security Adapt To The Unique Aspects Of Healthcare?
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Software House
    Other Resources
    • eMagazines
    • Videos
    One System, One Card

    One System, One Card

    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

About us Advertise
  • Self-Service Access Control
  • AI special report
  • Cybersecurity special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check Out Our Special Report On Casino Security

Get it now!

Avoid Damaging Network Breaches With Reevaluated Cybersecurity

Avoid Damaging Network Breaches With Reevaluated Cybersecurity
Todd Dunning
Todd Dunning
icon Add as a preferred source Download PDF version
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • Businesses must reassess cybersecurity from a damage-prevention rather than a cost perspective.
  • Change default passwords on IP devices to prevent easy access by cybercriminals.
  • Isolate security surveillance networks to protect against unauthorized intrusions.
Related Links
  • Assessing Cyber Security Risks And Vulnerabilities
  • Physical Security Continues To Support Cybersecurity Aims
  • Cyber Criminals Are Ready To Attack Your Business: Are You Ready To Defend It?
  • Cyber Security’s Balancing Act Between Utility And Protection

In today’s connected world, network intrusions and breaches have become a way of life, as hackers and cybercriminals work constantly to discover and exploit vulnerabilities. Because businesses of all sizes rely on their IT infrastructure to a growing degree, technology providers are working just as hard to stay ahead of would-be attackers. However, it’s difficult if not impossible to eliminate every potential threat. Therefore, it is highly likely that most organizations will suffer a breach at some point, introducing risks that can lead to business interruption, financial loss, reputational damage and more.

How We View And Evaluate Cybersecurity

In light of these realities and the potential fallout of network breaches, it is time to change the way we as an industry view and evaluate cybersecurity. Rather than seeing the technologies and practices for securing networks from a cost perspective, we must instead carefully consider the value of cybersecurity through the lens of the damage and potential liabilities of a breach caused by cybersecurity failures.

Traditional cost-centered views of cybersecurity are not only outdated but are also inaccurate, as securing the network begins far before the implementation of a cybersecurity solution – with best practices including a number of basic precautions that do not require major investments.

Security Passwords And Credentials

One of the most effective measures security professionals can take to decrease the likelihood that an IP device will be a hacker’s point of entry to a network is also one of the most basic: change default passwords. But as straightforward and obvious as this may be, the truth is that many networked surveillance cameras and other security technologies deployed in the field are still using default settings. Some estimates put their number of these IP devices in the hundreds of thousands.

The truth is that many networked surveillance cameras and other security technologies deployed in
the field are still using
default settings 

Cyber criminals know that there are websites dedicated to listing known default passwords for any number of branded IP devices, including cameras, access control hardware and more. This means these devices are essentially broadcasting to anyone who wants to put forth the effort it would take to access them. Not surprisingly, when hackers attempt to compromise a device, the first thing they try is the default password with an unbelievably high rate of success.

The only reason this risk exists is because installers and/or end users far too often fail to take the incredibly simple step of creating new passwords for IP devices when they are deployed. This is both unacceptable and unnecessary.

Segmented Surveillance Networks

Another critical step organizations can take to protect their IP cameras, recorders and other security devices from intrusion is to isolate the security surveillance network from networks used for general operations. Physically or virtually separating your security surveillance network from the general, internet-facing network prevents hackers from accessing surveillance systems, helping to protect your valuable, sensitive information.

For achieving this segmentation, virtual LANs are recommended. These networks separate traffic between surveillance systems and other devices on the network.

Tampering detection technology should also be employed to quickly detect any unauthorised access
Organisations can protect their security devices from intrusion by isolating the security surveillance network from general operations networks

Physical Access Tampering

Surprisingly, not all network intrusions are committed remotely by hackers using sophisticated technologies and methods to remotely gain access. Cybercriminals have considerable expertise in breaking into facilities and often begin their crimes with physical access to the systems they are looking to compromise. 

With physical access, individuals can reset any IP device to defaults, allowing new settings to be configured and security to be compromised. The first step in preventing this from happening is to install devices in locations where they cannot be reached easily, preferably within appropriate vandal-resistant housing that prevents physical access and damage. Tampering detection technology should also be employed to quickly detect any unauthorized access, and any cabling should be run through conduits or behind or through walls to prevent them from being unplugged or otherwise intercepted.

This is also where the entire physical security program, from access control to guards to software, provides protection for itself in addition to protecting the organization’s premises and personnel.

Monitored User Permissions

Another technique for preventing unwarranted or unauthorized access to data and settings is for organizations to restrict user permissions for both local and remotely connections to networks or devices.

A best practice for applying user permissions is the least privilege principle, which limits the features users may access to the minimum users require to perform their necessary functions. Additionally, any guest access to networks or devices should enable very limited functionality and access.

It is imperative that security professionals and/or end users ensure surveillance systems are up to date

Identify And Exploit Software Vulnerabilities

A common approach hackers employ is to identify and exploit software vulnerabilities, relying especially on versions that have not been updated to improve security. Once a vulnerability has been found, it is quickly shared online, which opens the door for multiple individuals to easily access devices running outdated firmware and potentially gain access to the network itself. Recognizing this, software providers continually release updates that deliver improvements to close these open doors and protect users from unauthorized intrusions.

However, no update can be effective if it isn’t installed, which is often the case, leaving devices and networks vulnerable to attacks. It is imperative that security professionals and/or end users ensure surveillance systems are up to date. All it takes is a few clicks to improve the cybersecurity protection of devices and networks.

Effective Cybersecurity Tactics

Unfortunately, network intrusions are here to stay and given the increasing sophistication of the tools and tactics hackers employ, the problem will only get worse. In the security industry, we must shift our view of cybersecurity away from costs and consider the value of preventing breaches. By employing some very basic but effective tactics, organizations can substantially increase the security of their networks and help to protect the sensitive data and assets they contain.

From facial recognition to LiDAR, explore the innovations redefining gaming surveillance

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • IP video surveillance
  • Physical security
  • Security devices
  • Security cameras
  • Security access systems
  • Security guards
  • Building security
  • Network cameras
  • Security software
  • Cyber security
  • Crime prevention
  • Data Security
  • Network Video Recorders
  • Related links
  • Pelco IP cameras
  • Networked Access control systems & kits
  • Network IP cameras
  • Articles by Todd Dunning
  • Related categories
  • Access control systems & kits
  • IP cameras
Related white papers
Aligning Physical And Cyber Defence For Total Protection

Aligning Physical And Cyber Defence For Total Protection

Download
Combining Security And Networking Technologies For A Unified Solution

Combining Security And Networking Technologies For A Unified Solution

Download
System Design Considerations To Optimize Physical Access Control

System Design Considerations To Optimize Physical Access Control

Download
Related articles
How Physical Security Consultants Ensure Cybersecurity For End Users

How Physical Security Consultants Ensure Cybersecurity For End Users

How Managed Detection And Response Enhances Cybersecurity Management In Organizations

How Managed Detection And Response Enhances Cybersecurity Management In Organizations

Drawbacks Of PenTests And Ethical Hacking For The Security Industry

Drawbacks Of PenTests And Ethical Hacking For The Security Industry

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Cyber security
  4. News
  5. Expert commentary
About this page

Boost network security with updated cybersecurity measures like zero-trust, IAM, and AI, ensuring data protection and business continuity.

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Addressing Cybersecurity Vulnerabilities In The Physical World
Addressing Cybersecurity Vulnerabilities In The Physical World
Enhancing Physical Access Control Using A Self-Service Model
Enhancing Physical Access Control Using A Self-Service Model
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec