You’ve likely heard the news about security cameras being vulnerable to exploits like what was covered in this piece:
I feel like I’m always talking in circles when it comes to security…stop repeating history, focus on the basics, do what you know needs to be done…It’s especially true for vulnerabilities in network security cameras. A little over nine years ago I wrote about this problem with cameras that I had been seeing for years.
Let this be a reminder that everything on your network is fair game. If it has an IP address or a URL – sometimes even less than that – then it’s a target.
The last thing you need is to show that you have security on your network in the form of cameras while, at the same time, leaving them wide open for abuse.
Do the following over and over again and you’re doomed to success with your information security program:
A really basic approach, I know, but it really is that easy. So many organizations are deficient in one or even all three of these areas. Don’t let that be you.
“A business associate referred our company to Principle Logic when we were seeking a resource to perform vulnerability /penetration testing for our external and internal networks. We found Kevin Beaver to be professional, well informed, and easy to work with. His testing did not disrupt our networks, and his progress updates were timely.
His final report was very thorough and included security recommendations for our network environment. The executive leadership was so impressed with Kevin’s security expertise, they have extended their agreement to continue to perform periodic testing. We highly recommend Kevin Beaver and Principle Logic as a resource for network security testing.”