TESTIMONIALS

“Received the latest edition of Professional Security Magazine, once again a very enjoyable magazine to read, interesting content keeps me reading from front to back. Keep up the good work on such an informative magazine.”

Graham Penn
ALL TESTIMONIALS
FIND A BUSINESS

Would you like your business to be added to this list?

ADD LISTING
FEATURED COMPANY
Cyber

Cyber procedure tips

by Mark Rowe

Cyber security is a challenge facing video security systems, not made easier by increasing use of cloud technologies, AI und IoT (Internet of Things). However, it is not uncommon for users to forget the most basic precautions, says the German manufacturer Dallmeier. The firm offers five “procedure tips”.

Safeguarding a video system involves many technical components, and expertise. However, there are a number of basic aspects which do not fall within the realm of pure technology – but are at least as important as a good firewall. For Cybersecurity Month October, the five “soft” procedural aspects are:

User rights:
Operators should only set up user accounts with user rights that are absolutely essential to their function. This reduces the threat of manipulation “from inside”.

Passwords:
Still a subject which is neglected much too often: Default username/password combinations should be changed without fail, and strong passwords should be used. Especially important: Check that this rule is being observed.

Unnecessary services:
A small number of services automatically reduces the number of potential points of attack. Accordingly, it is advisable to consider carefully: Which services are needed, which can be disabled?

Updates and patches:
Nothing changes faster than the number and nature of cyberattacks. Therefore, product updates and security patches should be installed promptly, and maintenance contracts should always be kept up to date.

Up-to-date system components:
Everyone is delighted when systems remain usable for a long time and don’t break down. But especially with regard to IoT systems, it is always worth considering whether it might be better to replace components even if they are still fully functional, for example because no more security updates are being issued. In this area, economising until the bitter end is not always the right strategy.

Related News

  • Cyber

    Unpatched and vulnerable

    by Mark Rowe

    Muhammad Yahya Patel, lead security engineer at Check Point Software, considers roadblocks to effective patch management. The landscape of cybersecurity is fraught…

  • Cyber

    Belfast cyber partnership

    by Mark Rowe

    The US cyber firm Rapid7 has launched a security research partnership with the Centre for Secure Information Technologies (CSIT) at Queen’s University…

  • Cyber

    NIS2 directive impact

    by Mark Rowe

    While IT people have managed to secure enough budget to meet the NIS2 directive, the impact on other areas could be significant,…