24.12.2018 Views

PSIJanuary2019

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

PROMOTION<br />

Cameras and cyber health<br />

In the first of a new series of<br />

blogs, Axis reveals the four ways<br />

you could be risking the cyber<br />

health of network cameras<br />

ybersecurity threats have continued to<br />

Cgrow substantially over the past few years.<br />

Proactive prevention practices remain the<br />

best protection, like early detection of poor<br />

maintenance routines, which allows businesses<br />

to build in cybersecurity into their work<br />

routines. An important dimension here is<br />

maintaining IT systems and network cameras —<br />

as important as the deployment of the system<br />

itself. Over time, if security systems are<br />

inadequately maintained, they are likely to<br />

become susceptible to vulnerabilities and data<br />

breaches.<br />

Below are the four signs of poor system<br />

cyber health identified by Axis that you must be<br />

aware of to ensure that surveillance and<br />

security systems remain protected:<br />

Teams are not aligned<br />

This could be an issue regarding a disparity<br />

between how hardware and software solutions<br />

are connected to the network, or how IT policies<br />

recommend they should be connected. A lack of<br />

alignment between IT and security teams and<br />

processes is amplified further when disparate<br />

networks are involved, leading to increased<br />

confusion regarding the correct security<br />

measures to take. In turn, this will increase risks<br />

of data breaches.<br />

Users, policies and procedures<br />

36% of all reported data breaches were due to<br />

human error, according to the Notifiable Data<br />

Breach report which covers all breaches from<br />

April 1 to June 30 in 2018.<br />

Following IT policies is a crucial protocol to<br />

avoid extremely preventable breaches. By<br />

having standards in place, users can ensure that<br />

the system remains secure and operates at its<br />

optimum level. Remember the enforcement of<br />

policies needs to be ongoing, as some users or<br />

new recruits may be unaware of, or be following,<br />

procedures systematically. One unintended<br />

action could put the whole system at risk.<br />

Thus, if the company hasn’t specified clearly<br />

defined requirements and expectations with<br />

regards to IT security, the organisation suffers<br />

from a dramatically increased likely to<br />

encounter cyber-attacks.<br />

Installation and maintenance plans<br />

It can happen that the installer will not<br />

completely understand or account for all of the<br />

specific needs that a system requires at the time<br />

it is deployed. It is also plausible for some<br />

vendors to be not regularly visiting businesses<br />

for a planned maintenance interval. Systems<br />

that are not well maintained also suffer from<br />

dramatically increased susceptibility to attacks.<br />

All stakeholders responsible for maintenance<br />

should have a clear schedule for testing and<br />

maintaining the system, and that a clear audit<br />

trail is kept — from the day of installation<br />

onwards so any issues can be easily identified<br />

and rectified,<br />

Vendors and cyber security<br />

Any technology vendor should ideally keep<br />

users well informed about the best practices for<br />

network health and discuss which precautions<br />

can be taken regarding cybersecurity. Each<br />

technology is part of a bigger system and it is<br />

likely that systems are not fully secured.<br />

Conclusion<br />

Businesses cannot be expected to maintain the<br />

protection of their assets independently. It<br />

requires a collaborative effort to manage threats<br />

on a system level. Protecting an organisation’s<br />

network, its devices and services from<br />

cyberattacks is not the user’s concern alone;<br />

responsibility falls across the entire vendor<br />

supply chain.<br />

www.axis.com/about-axis/cybersecurity/<br />

Over time, if security<br />

systems are<br />

inadequately<br />

maintained, they are<br />

likely to become<br />

susceptible to<br />

vulnerabilities and<br />

data breaches<br />

To understand more about Axis<br />

solutions that can help protect<br />

your data and network, visit:<br />

www.psimagazine.co.uk<br />

17

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!