Guest Column | December 21, 2015

4 Best Practices Integrators Need To Know About Video Surveillance And Cybersecurity

By John Bartolac, Senior Manager, Industry Segments Team and North America Cyber Strategy, Axis Communications

We’ve all seen the headlines: “22 million personal records stolen in OPM hack,” “data breach costs retailer $162 million dollars,” “hackers gain access to data via HVAC device,” “Major motion picture giant hack results in theft of confidential and personal information.” With the focus on cybersecurity so high and the risks increasing, it’s imperative that integrators and end users of all solutions ensure they are taking proper measures to avoid the proverbial hot seat. Here are four best practices relative to video surveillance and cybersecurity risk mitigation to get you started.

  1. Video is valuable data. Video is another form of data that organizations need to protect. Many think “a breach won’t happen here,” but the reality is that it can and will happen if the network is not secured properly. Video in the wrong hands can pose a significant risk to any business. Theft of video can provide others with full operational awareness of an organization, providing detailed timing and patterns of the personnel, locations and procedures around high-level assets. Additionally, video can also hold the same information of VIPs, in turn putting them at risk. Finally, accessing or hacking a video solution can result in manipulation of the video devices or full disablement, putting the organization in a vulnerable or blind situation against physical threats to its facilities and assets.

Please log in or register below to read the full article.

access the Guest Column!

Get unlimited access to:

Trend and Thought Leadership Articles
Case Studies & White Papers
Extensive Product Database
Members-Only Premium Content
Welcome Back! Please Log In to Continue. X

Enter your credentials below to log in. Not yet a member of VAR Insights? Subscribe today.

Subscribe to VAR Insights X

Please enter your email address and create a password to access the full content, Or log in to your account to continue.

or

Subscribe to VAR Insights