Cyberattacks targeting IoT devices and consequently video systems as well are growing more frequent at an unprecedented rate. The things users should consider in their security strategy are highlighted in an information package from the Regensburg-based video equipment manufacturer. They show the essential aspects extend beyond the classic instruments of cybersecurity.
Security specialists at many banks in several different countries were undoubtedly completely blindsided in 2013 when Russian hacker groups “purloined” a sum totalling more than a hundred million euros in the course of the “Carbanak” campaign.
In these attacks, surveillance cameras inside the financial institutions were compromised, allowing the perpetrators to secretly view screen contents and keyboard entries and identify employees as spear phishing targets from their name tags or employee IDs.
Dallmeier identifies five aspects to a protection strategy: consideration of security issues as early as the planning phase, integration in the IT strategy, cybersecurity functions in the systems, data protection and the credibility of the manufacturer.
Due consideration of security, questions should be included in the planning stage, for example by intelligent use of 3D technology. Secondly, it is important to ensure that the planned system is consistent with the company’s IT strategy. For the actual core function “cybersecurity,” it is important that systems are equipped with all the requisite “IT security” functions, from hardened operating systems, to capabilities for separating networks and up to an including encryption technologies and attack detection capabilities.
The fourth aspect should be practically self-evident since the entry into force of the GDPR, consideration of data protection issues. Finally, customers should also think very carefully about the manufacturer itself – is the manufacturer potentially exposed to political pressure, and what provisions are made for security aspects when integrating the systems with each other and integrating third party systems?
The manufacturer’s information package is intended to provide answers to these and other questions and with a “Best Practice Guide” offers an extensive collection of practical tips and configuration notes for IT and security officers and administrators. The information package includes a “Best Practice Guide” as well as the latest issue of “Video Extra” and the Dallmeier data protection and data security brochure.