PSIJanuary2019
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
PROMOTION<br />
Cameras and cyber health<br />
In the first of a new series of<br />
blogs, Axis reveals the four ways<br />
you could be risking the cyber<br />
health of network cameras<br />
ybersecurity threats have continued to<br />
Cgrow substantially over the past few years.<br />
Proactive prevention practices remain the<br />
best protection, like early detection of poor<br />
maintenance routines, which allows businesses<br />
to build in cybersecurity into their work<br />
routines. An important dimension here is<br />
maintaining IT systems and network cameras —<br />
as important as the deployment of the system<br />
itself. Over time, if security systems are<br />
inadequately maintained, they are likely to<br />
become susceptible to vulnerabilities and data<br />
breaches.<br />
Below are the four signs of poor system<br />
cyber health identified by Axis that you must be<br />
aware of to ensure that surveillance and<br />
security systems remain protected:<br />
Teams are not aligned<br />
This could be an issue regarding a disparity<br />
between how hardware and software solutions<br />
are connected to the network, or how IT policies<br />
recommend they should be connected. A lack of<br />
alignment between IT and security teams and<br />
processes is amplified further when disparate<br />
networks are involved, leading to increased<br />
confusion regarding the correct security<br />
measures to take. In turn, this will increase risks<br />
of data breaches.<br />
Users, policies and procedures<br />
36% of all reported data breaches were due to<br />
human error, according to the Notifiable Data<br />
Breach report which covers all breaches from<br />
April 1 to June 30 in 2018.<br />
Following IT policies is a crucial protocol to<br />
avoid extremely preventable breaches. By<br />
having standards in place, users can ensure that<br />
the system remains secure and operates at its<br />
optimum level. Remember the enforcement of<br />
policies needs to be ongoing, as some users or<br />
new recruits may be unaware of, or be following,<br />
procedures systematically. One unintended<br />
action could put the whole system at risk.<br />
Thus, if the company hasn’t specified clearly<br />
defined requirements and expectations with<br />
regards to IT security, the organisation suffers<br />
from a dramatically increased likely to<br />
encounter cyber-attacks.<br />
Installation and maintenance plans<br />
It can happen that the installer will not<br />
completely understand or account for all of the<br />
specific needs that a system requires at the time<br />
it is deployed. It is also plausible for some<br />
vendors to be not regularly visiting businesses<br />
for a planned maintenance interval. Systems<br />
that are not well maintained also suffer from<br />
dramatically increased susceptibility to attacks.<br />
All stakeholders responsible for maintenance<br />
should have a clear schedule for testing and<br />
maintaining the system, and that a clear audit<br />
trail is kept — from the day of installation<br />
onwards so any issues can be easily identified<br />
and rectified,<br />
Vendors and cyber security<br />
Any technology vendor should ideally keep<br />
users well informed about the best practices for<br />
network health and discuss which precautions<br />
can be taken regarding cybersecurity. Each<br />
technology is part of a bigger system and it is<br />
likely that systems are not fully secured.<br />
Conclusion<br />
Businesses cannot be expected to maintain the<br />
protection of their assets independently. It<br />
requires a collaborative effort to manage threats<br />
on a system level. Protecting an organisation’s<br />
network, its devices and services from<br />
cyberattacks is not the user’s concern alone;<br />
responsibility falls across the entire vendor<br />
supply chain.<br />
www.axis.com/about-axis/cybersecurity/<br />
Over time, if security<br />
systems are<br />
inadequately<br />
maintained, they are<br />
likely to become<br />
susceptible to<br />
vulnerabilities and<br />
data breaches<br />
To understand more about Axis<br />
solutions that can help protect<br />
your data and network, visit:<br />
www.psimagazine.co.uk<br />
17