Physical Security and the Internet of Things
Download our free ebook, Physical Security and the Internet of Things: A Cyber security Guide, to learn:
- where the gaps are in the IoT
- the steps to secure your IoT system
- how to plan for a more secure IoT future
IoT devices, specifically network cameras, are a frequent target for hackers.
Why is this?
Cameras are often installed with factory default administrative passwords, which are published on the Internet. If passwords are changed, they tend to be weak and static (never changing). This makes them vulnerable to brute force attacks or unwanted sharing by contract technicians, former employees and through social engineering.
Network cameras also tend to have vulnerabilities due to open well-known listener ports for services such as Telnet, UPnP or factory-installed administrative backdoors. These network services and backdoors are innate in the camera firmware, yet are typically not accessed by users or administrators. They often may have published passwords that are separate from the camera’s global or web administration password. Camera vendors rectify these vulnerabilities over time through hardening guides and firmware updates.
For an IT manager, addressing these vulnerabilities by changing camera passwords and updating firmware across a multi-vendor fleet of geographically dispersed surveillance cameras can be complex, time-consuming and expensive.
To learn more, download our free ebook, Physical Security and the Internet of Things: A Cyber security Guide.