Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 

De la Théorie à la pratique





















Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

Eagle Eye Networks: 12 Security Camera System Best Practices for Cyber Protection

April 2015 by Eagle Eye Networks

Eagle Eye Networks announced the availability of its “12 Security Camera System Best Practices for Cyber Protection” white paper. The report covers the major vulnerabilities for security camera system and the twelve corresponding cyber security best practices. The best practices are designated according to whether the system is a true cloud solution, or a traditional DVR, NVR, or VMS systems that is connected to the Internet or corporate network.

With video surveillance, you are typically protecting your employees and company assets. With today’s increasingly internet-connected surveillance systems you need cyber protection or you will expose your company to serious threats, loss of customer data, and loss of company reputation.

“Not only are cyber breaches a major corporate expense, they can destroy the hard-built trust between companies and their customers,” said Dean Drako, President and CEO at Eagle Eye Networks. “Almost 70% of IT is concerned with cyber-security for video surveillance systems. We created these best practices so companies can get a similar level of cyber protection on their video surveillance system as they target with their traditional IT systems.”

This white paper focuses on the best practices for internet-connected security camera systems and cloud-managed video surveillance. Many of these practices also apply to other physical security systems.

The vulnerabilities and cyber-safe best practices for security camera systems covered are:

1. Camera passwords
2. Port forwarding
3. Firewalls
4. Network topology
5. Operating systems
6. Operating systems passwords
7. Video surveillance system passwords
8. Connection encryption
9. Video encryption
10. Mobile
11. Physical access to equipment & storage
12. Video recording software




See previous articles

    

See next articles