Cyber security continues to dominate headlines. From retail businesses to government bodies, breaches are becoming more prevalent. In the security business, we need to consider the risk our devices pose to the organization. In other words, could a person with ill intent use the security devices to infiltrate the network, access critical systems, and steal personal data or business information? Could a criminal infiltrate the security system, disable it, and then make a physical breach on the facility?
Cyber security experts execute penetration tests on video surveillance cameras and other devices to a level most of us could never attempt. These experts are finding ways to secure cameras and other equipment that secure our facilities, personnel, data, and assets at the device level. However, without implementing the most basic of policies and procedures at the installer and end user level, criminal access and control is simple.
Basic security tactics, such as passwords for security cameras and other devices, are a great start when deploying a security solution. The manufacturer, IT department, integration partner, and end user must all work together to develop and implement these tactics as a team.
Engineers and manufacturers create products built for physical and cyber resiliency. Internal operating systems must be stringently tested and risk-limited. Be sure to approve only equipment manufactured under the strictest testing and production procedures. Demand information outlining the security measures developed to secure your devices.
The IT department should include each device in their network security plan. They will need detailed plans that show what devices are on the network and where the devices are placed on site.
When cameras are being installed, it’s imperative that the proper password scheme is applied to them as well as to storage servers and all other components of the solution. Additionally, if the integration partner is selecting the manufacturer to be used, they should be well-versed in that manufacturers pre-installed security features.
While some security cameras require password implementation during startup, others may not. Failure to apply a password can open the camera to criminal activity or vandalism.
Develop your policies and procedures to include your security devices. Review these procedures regularly and encourage your team to take the security of their information personally. A major breach affects everyone.
Contact the Vision team for a complete review of your current security solution and cyber vulnerability. If you’re considering a new system, we’ll start with ground-level stakeholder coordination to develop a comprehensive and customized security solution.