Page 38 - Security Today, May 2017
P. 38

reportedly been uploaded to these remote locations without the con- sent or awareness of the user. Other cameras have been infected with malware within seconds of being connected to the Internet, or as be- ing easily hacked.
While there is reason for action and a need for more education, there is no cause for panic as the security industry is responding. The challenge faced by manufacturers of network-enabled security prod- ucts—including surveillance cameras—is to balance ease of instal- lation and ongoing operation with the protection of the device, the network and the connected infrastructure.
A product with extremely strong cybersecurity protection may turn away customers by being too restrictive or complex for their needs. Conversely, a product that is exceptionally easy to setup and use may be a gateway to cyberattack.
Finding the balance between these two factors while meeting the requirements of IT is a challenge to be solved by manufacturers. Arecont Vision relies on its in-house developed Massively Parallel Image Processing architecture and FPGA (field programmable gate array) technology to eliminate or mitigate cybersecurity risks and en- able camera updates. The company also takes that further by de- veloping its own feature and not licensing third-party code for core features. This eliminates the risk of hidden backdoors or of malicious code lurking unsuspected and undetected. Other manufacturers will have their own approaches to cybersecurity.
Being prepared is the best cybersecurity defense, regardless of the products used. The following dozen recommendations are starting points for any security organization formulating their own cyberse- curity polices.
Choose products that provide security protection while balancing
the user experience. Only devices that include basic security protec- tion such user IDs and 16 digit ASCII passwords should be allowed on the network. The administration interface must balance ease of installation with adequate cybersecurity protection, without making the device unduly complicated to use and manage.
Segregate the network. Good design policy is to separate and firewall cameras, access control, alarm, sensors, and IT systems onto individual networks or sub-nets. Sharing a single network between different applications increases the risk of both performance issues, and both exposure to and the success of a cyberattack. Eliminating unnecessary connections to the wider corporate network and to the global Internet can also reduce the risk of successful cyberattacks.
Update firmware. All cameras, servers, NVRs/DVRs, storage de- vices, switches, routers, WiFi access points and any other network- connected devices should be regularly updated with the latest avail- able manufacturer firmware to eliminate security holes. No device that cannot be fully updated with new security measures, features or enhancements should ever be connected to the network, and a policy should be enforced to ensuring such updates are performed.
Limit authorization and access to only those who need it. Limit physical and network access to individual systems, data and infra- structure to only those who require that access. Enforce password changes on an appropriate cycle and with any departure of employ- ees and contractors formerly with access.
Change default password settings. An increasing number of cyber- attacks are made using default IDs and passwords. Cameras, DVRs and other security systems now join computers, storage and security systems as potential network access points for a cyberattack, and of- ten have less security included.
Dependable Electronic Lock Systems
A FULLY CUSTOMIZABLE "KEYLESS" SECURITY SYSTEM
Our in-house support team is able to answer any question you have
Use your phone, tablet or any web enabled device for secure access.
CyberLock Introduces FlashLockTM
Control access from anywhere in the world with an internet connection!
FlashLock
Uses Serial Optical Communications Technology
All Flashlock products are manufactured in the USA
support@cyberlock.com
BENEFITS OF FLASHLOCK
» Grant access via text or email
» Grant temporary or ongoing access
» No app to download
» Quick, Convenient Access » Track Audit Trails
» No Bluetooth to pair
22
Untitled-2 1
1/12/17 10:15 AM
For more information: www.cyberlock.com/flashlock • 541.738.5500 • sales@cyberlock.com
Go to sp.hotims.com and enter 8 for product information.
0517 | SECURITY TODAY
NETWORK CAMERA SOLUTIONS

































































   36   37   38   39   40