Addressing the Basics of Cyber Security


Jeff Whitney, VP Marketing, Arecont Vision & Member, SIA Cybersecurity Advisory Board 

Installers & integrators should choose products that provide adequate cybersecurity protection, only using devices that include basic security protection, such as user ID and passwords that can be enable during or after system commissioning.  Passwords are far from perfect, but are an essential first step with most systems.

Password practices should adhere to the current industry standard of up to 16 ASCII characters in length, and vary from device to device.  For large networks, a security password management system is recommended.

Equally important is that the balance between the user experience and cybersecurity protection is not a “one-size-fits-all” solution.  It must be adjusted for the specific requirements of the environment and associated risk.

Products selected should only be from manufacturers who have a demonstrated commitment to cybersecurity awareness, education and protection, and who are supportive of industry efforts and standards. 

A growing number of devices, ranging from tablets and phones, home appliances, security alarms, manufacturing equipment, and even entire buildings are part of the growing IoT infrastructure.  None of these devices should be allowed onto the network without verification that they are cyber-secure to current standards.

It is good policy to separate surveillance systems onto individual, dedicated IP networks or subnets.  Sharing a single network for different systems and purposes increases both performance issues and the risk exposure to cyberattack.  Typically, IT professionals will implement segmentation as a standard practice.

Separate networks or subnets lessen the risk of a breach or cyberattack spreading beyond the targeted system, as well as lessening the risk of QoS (Quality of Service) impact.

‘Air gapping’ segments or entire networks, especially those that do not require Internet access or connection to the wider corporate network on a regular basis, is a good step for cyber protection.

Only use devices that support firmware and security updates.  This is often overlooked for IoT devices.  Any device connected to the network should be regularly checked for new firmware updates, tested and updated, just as IT typically does for devices under its control.

Limit access to systems, data, and infrastructure to those who require it on a regular basis.  A single password for all cameras, or all DVRs, NVRs, data storage, etc., is not secure. Enforce password changes on a regular basis.

Never use default passwords! An increasing number of breaches and cyberattacks are made using default logins.  Security devices are no exception.  Implement a strong password policy and enforce it.

Manufacturers that are serious about cyber protection should have a document strategy for testing and integrating other components of the network infrastructure securely.  A testing and/or certification lab for 3rd party products is a strong indicator that they are serious about cybersecurity.

Regularly scan the network for viruses and malware, as well as for security vulnerabilities.  This basic step is often overlooked for security networks,

Installers and integrators need to ensure that all staff are aware of and education in the risks and challenges of cybersecurity.  Everyone needs basic cybersecurity awareness, and it should be part of staff training and development.

Both IT and security departments should include cybersecurity as part of their regular reviews and assessments of the infrastructure and system.

Mitigation and recovery plans are key.  Having a disaster recovery plan in place for the aftermath of potential cyberattacks shows end users that the system installer or integrator has adopted a responsible approach.

Finally, consider the risk and potential for damage to your company, its partners, and its customers.  It may be that cybersecurity insurance is key to mitigating the financial aspect and liability of such a risk.

Risk levels will vary based upon the environment and organization, and not every application will be appropriate for this type of protection.

Source in page 43: http://flickread.com/edition/PensordFreeLibrary/5a30d704e0c7c/