With the evolution to our “networked world”, the old analogue camera and video recorders have been replaced with more advanced, higher quality and remotely accessible IP cameras and NVRs. While this move to networkable video equipment has allowed for business owners to access their video from anywhere around the world, it has also brought with it the concern of cybersecurity. Since these devices are commonly connected to the Internet along with a portion of the internal business network, these concerns are well founded. Any connection to the Internet carries with it risks that cannot be fully eliminated, but these risks can be managed to the point where they are almost negligible. Following a set of common security rules can greatly reduce the chance of your networked video equipment from being compromised.
Recommended “Best Practices”
- Keep IP Video System devices such as NVR’s behind closed and locked doors
- Limit physical access to any IP Video System to only necessary employees
- Track access to the video equipment with means such as a card access system and/or cameras
- Install IP Video System devices behind a firewall appliance between the Internet and other IT assets
- Do not use the default network ports that come configured in the network video equipment
- Change the default password that comes configured in all IP Video System equipment (cameras, NVR, software etc.)
- For logins, choose passwords that are difficult to guess and that follow standard network security rules
- When possible, assign both user names and passwords (some equipment does not support this capability)
- Limit login access to only necessary users
- Limit user access according to their credentials and what task(s) they should be allowed to perform
- Enable the password lock-out option when available on the video equipment (example: three failed login attempts results in 5-minute lockout)
- Ensure that any PC with video software installed on it is locked out (requires login/password) when left alone, and enable a screen saver to lock the screen after a short period of time in case the PC is accidently left unattended
- Ensure that any device (cellphone, tablet, etc.) used for remote access are also used with the same security protocols
- On all IP Video System equipment and related software, keep all firmware and software versions up to date (cameras, NVRs, Video Management Software etc.)
The Roll of IT Departments
Along with network security concerns, IP Video Systems can place a large traffic load on a network with HD video capable of consuming a large bandwidth. This is why it’s so important to work closely with your IT department along with your TELUS Secure Business representative when planning and designing an IP Video System.
Your IT department will be well aware of cybersecurity threats and able to assist in applying all “Best Practices” applicable to your IP Video System as well as designing a robust network solution.
The basics for “Best Practices” have been provided above. Your IT department will be able to assist with the details for each recommendation and provide any additional recommendations of their own.
Contact your TELUS Secure Business Representative, and they will be able to support your choice of IP Video System and share the technical details about the product that your IT department requires.