Internet Connected Video Security is under attack
We are all at risk if we don’t begin the process of securing our security and surveillance devices and internet connected convenience devices. The mobile app’s that provide access to our home & businesses internet connected video security are becoming easier to set-up. But the cost of easy setup is often your network’s security. Online security and surveillance devices are an attractive target for hackers, who scan devices for security vulnerabilities and then install malicious software. Once a hacker has access to your network they can interfere with the operation of your video security device, install a DDoS bot and gain access your computers and electronic devices on the same network.
The Department of Justice offers insight into Securing Your “Internet of Things” Devices with a well written guide that you can download and print. The DOJ explains this issue thoroughly in the introduction followed by several precautions. Here is an example: “If you determine that your IoT device has been compromised by Mirai or similar malware, turn it off and then on again after several seconds to purge the device’s memory, as instructed above.
Malware, such as Mirai, often resides in an IoT device’s memory, so purging the memory will remove the malware. If your device was compromised because of poor password management, change your password and follow good password management practices as described above before reconnecting it to the Internet. If you suspect your IoT devices has been compromised, we encourage you to file a report regarding your with the Internet Crime Complaint Center. You can find them here : https://www.ic3.gov.
More on how to protect your internet connected video security system.
10 ways to avoid hacked security cameras in your home or business.
- If you have the skills to create a separate network solely for your security camera system and connected devices. This is an excellent method to keep your personal and business data secure. If you do not have the time or training to complete this task, then contact a company that does. Red Hawk Security Services (855)683-4700
- Keep your video security cameras & other internet connected devices firmware current. You can find links to technology companies firmware here.
- Choose strong passwords and a different password for every device.
- Bad Guys will scan for open (forwarded) ports. Is remote connection to your video security mandatory? If so, open only the ports you need, using only the protocols
- Telnet stays off
- Immediately change your IoT device default username and password! As Brian Krebs from the blog krebsonsecurity.com points out, they are listed everywhere.
- Set a strong password. We listed this twice because it’s too important to only say once.
- Don’t be lazy when choosing a password. abc123 or 123456 will be hacked in seconds.
- Turn off Universal Plug and Play (UPnP)
- Use Two-Factor Authentication (2FA) whenever possible
- Do you trust your security camera manufacturers cloud storage or peer-to-peer service? Many of the largest security, networking & technology companies have been compromised too.
How to create a strong password.
Combine uppercase, lowercase letters with number & special characters to form a word or phrase that is at least 10 characters in length..
Lowercase (small) letters. Examples: h, a, w, k
Uppercase (capital) letters. Examples: R, E, D
Numbers. Examples: 9, 2, 7
Symbols and special characters. Examples: #, !, , @, _ , -, &
To assist you to remember your password you can use character substitution to create a strong, secure password. This is called a “Munged Password” (Modify Until Not Guessed Easily) replace letters with numbers & symbols.
8uttErfly The b becomes an eight (B8), and any other letter can be capitalized
butt3rfl? The e becomes a three (E3), and the Y becomes a question mark (Y = Why?)
bu2Terfly The two Ts become 2T
8u2T3RfL? a combination of all the above
For high-security applications, this may not be effective. It is certainly better than using your street address or wife’s birthday.
Further reading on securing your internet connected video security and IoT devices.
Implementing Security Zones with Home Routers Informative article from Rob at jervis.ws
Microsoft has some solid advice for those who have more than a basic understanding of how network connected video security operates over the internet.
Internet of Things (IoT) infrastructure requires a rigorous security-in-depth strategy
Microsoft – Internet of Things security best practices
And this from USA Today
Feds offer ways to make Internet of Things more secure
Building security into the heart of the connected devices flooding into our homes and businesses needs to happen sooner rather than later to protect the integrity of the Internet that we all depend on.” USA Today story, Feds offer ways to make Internet of Things more secure