Cyber

Cyber procedure tips

by Mark Rowe

Cyber security is a challenge facing video security systems, not made easier by increasing use of cloud technologies, AI und IoT (Internet of Things). However, it is not uncommon for users to forget the most basic precautions, says the German manufacturer Dallmeier. The firm offers five “procedure tips”.

Safeguarding a video system involves many technical components, and expertise. However, there are a number of basic aspects which do not fall within the realm of pure technology – but are at least as important as a good firewall. For Cybersecurity Month October, the five “soft” procedural aspects are:

User rights:
Operators should only set up user accounts with user rights that are absolutely essential to their function. This reduces the threat of manipulation “from inside”.

Passwords:
Still a subject which is neglected much too often: Default username/password combinations should be changed without fail, and strong passwords should be used. Especially important: Check that this rule is being observed.

Unnecessary services:
A small number of services automatically reduces the number of potential points of attack. Accordingly, it is advisable to consider carefully: Which services are needed, which can be disabled?

Updates and patches:
Nothing changes faster than the number and nature of cyberattacks. Therefore, product updates and security patches should be installed promptly, and maintenance contracts should always be kept up to date.

Up-to-date system components:
Everyone is delighted when systems remain usable for a long time and don’t break down. But especially with regard to IoT systems, it is always worth considering whether it might be better to replace components even if they are still fully functional, for example because no more security updates are being issued. In this area, economising until the bitter end is not always the right strategy.

Related News

  • Cyber

    State of digital

    by Mark Rowe

    Digital transformation is a top priority and source of anxiety for enterprises, but most IT decision makers have not completed technology deployments…

  • Cyber

    Securing collaboration tools

    by Mark Rowe

    Before cloud computing, organisations could rely on their company’s firewall to act as a strong, secure perimeter to protect against many application…

Newsletter

Subscribe to our weekly newsletter to stay on top of security news and events.

© 2024 Professional Security Magazine. All rights reserved.

Website by MSEC Marketing