SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

Avoid damaging network breaches with reevaluated cybersecurity

Avoid damaging network breaches with reevaluated cybersecurity
Todd Dunning
Todd Dunning
icon Add as a preferred source Download PDF version
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • Change default passwords to prevent IP device security breaches and unauthorised access.
  • Implement network segregation to protect surveillance systems from cyber intrusions.
  • Update software regularly to mitigate vulnerabilities and enhance cybersecurity resilience.
Related Links
  • Assessing cyber security risks and vulnerabilities
  • Physical security continues to support cybersecurity aims
  • Cyber criminals are ready to attack your business: Are you ready to defend it?
  • Cyber security’s balancing act between utility and protection

In today’s connected world, network intrusions and breaches have become a way of life, as hackers and cybercriminals work constantly to discover and exploit vulnerabilities. Because businesses of all sizes rely on their IT infrastructure to a growing degree, technology providers are working just as hard to stay ahead of would-be attackers. However, it’s difficult if not impossible to eliminate every potential threat. Therefore, it is highly likely that most organisations will suffer a breach at some point, introducing risks that can lead to business interruption, financial loss, reputational damage and more.

How we view and evaluate cybersecurity

In light of these realities and the potential fallout of network breaches, it is time to change the way we as an industry view and evaluate cybersecurity. Rather than seeing the technologies and practices for securing networks from a cost perspective, we must instead carefully consider the value of cybersecurity through the lens of the damage and potential liabilities of a breach caused by cybersecurity failures.

Traditional cost-centered views of cybersecurity are not only outdated but are also inaccurate, as securing the network begins far before the implementation of a cybersecurity solution – with best practices including a number of basic precautions that do not require major investments.

Security passwords and credentials

One of the most effective measures security professionals can take to decrease the likelihood that an IP device will be a hacker’s point of entry to a network is also one of the most basic: change default passwords. But as straightforward and obvious as this may be, the truth is that many networked surveillance cameras and other security technologies deployed in the field are still using default settings. Some estimates put their number of these IP devices in the hundreds of thousands.

The truth is that many networked surveillance cameras and other security technologies deployed in
the field are still using
default settings 

Cyber criminals know that there are websites dedicated to listing known default passwords for any number of branded IP devices, including cameras, access control hardware and more. This means these devices are essentially broadcasting to anyone who wants to put forth the effort it would take to access them. Not surprisingly, when hackers attempt to compromise a device, the first thing they try is the default password with an unbelievably high rate of success.

The only reason this risk exists is because installers and/or end users far too often fail to take the incredibly simple step of creating new passwords for IP devices when they are deployed. This is both unacceptable and unnecessary.

Segmented surveillance networks

Another critical step organisations can take to protect their IP cameras, recorders and other security devices from intrusion is to isolate the security surveillance network from networks used for general operations. Physically or virtually separating your security surveillance network from the general, internet-facing network prevents hackers from accessing surveillance systems, helping to protect your valuable, sensitive information.

For achieving this segmentation, virtual LANs are recommended. These networks separate traffic between surveillance systems and other devices on the network.

Tampering detection technology should also be employed to quickly detect any unauthorised access
Organisations can protect their security devices from intrusion by isolating the security surveillance network from general operations networks

Physical access tampering

Surprisingly, not all network intrusions are committed remotely by hackers using sophisticated technologies and methods to remotely gain access. Cybercriminals have considerable expertise in breaking into facilities and often begin their crimes with physical access to the systems they are looking to compromise. 

With physical access, individuals can reset any IP device to defaults, allowing new settings to be configured and security to be compromised. The first step in preventing this from happening is to install devices in locations where they cannot be reached easily, preferably within appropriate vandal-resistant housing that prevents physical access and damage. Tampering detection technology should also be employed to quickly detect any unauthorised access, and any cabling should be run through conduits or behind or through walls to prevent them from being unplugged or otherwise intercepted.

This is also where the entire physical security programme, from access control to guards to software, provides protection for itself in addition to protecting the organisation’s premises and personnel.

Monitored user permissions

Another technique for preventing unwarranted or unauthorised access to data and settings is for organisations to restrict user permissions for both local and remotely connections to networks or devices.

A best practice for applying user permissions is the least privilege principle, which limits the features users may access to the minimum users require to perform their necessary functions. Additionally, any guest access to networks or devices should enable very limited functionality and access.

It is imperative that security professionals and/or end users ensure surveillance systems are up to date

Identify and exploit software vulnerabilities

A common approach hackers employ is to identify and exploit software vulnerabilities, relying especially on versions that have not been updated to improve security. Once a vulnerability has been found, it is quickly shared online, which opens the door for multiple individuals to easily access devices running outdated firmware and potentially gain access to the network itself. Recognising this, software providers continually release updates that deliver improvements to close these open doors and protect users from unauthorised intrusions.

However, no update can be effective if it isn’t installed, which is often the case, leaving devices and networks vulnerable to attacks. It is imperative that security professionals and/or end users ensure surveillance systems are up to date. All it takes is a few clicks to improve the cybersecurity protection of devices and networks.

Effective cybersecurity tactics

Unfortunately, network intrusions are here to stay and given the increasing sophistication of the tools and tactics hackers employ, the problem will only get worse. In the security industry, we must shift our view of cybersecurity away from costs and consider the value of preventing breaches. By employing some very basic but effective tactics, organisations can substantially increase the security of their networks and help to protect the sensitive data and assets they contain.

From facial recognition to LiDAR, explore the innovations redefining gaming surveillance

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • IP video surveillance
  • Physical security
  • Security devices
  • Security cameras
  • Security access systems
  • Security guards
  • Building security
  • Network cameras
  • Security software
  • Cyber security
  • Crime prevention
  • Data Security
  • Network Video Recorders
  • Related links
  • Pelco IP cameras
  • Networked Access control systems & kits
  • Network IP cameras
  • Articles by Todd Dunning
  • Related categories
  • Access control systems & kits
  • IP cameras
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
  5. Expert commentary
About this page

Boost network protection with updated cybersecurity measures, safeguarding end-users from evolving threats and ensuring data privacy compliance.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec