IoT security cameras: a found fodder for hackers

IoT security cameras: a found fodder for hackers

Share post

IoT security cameras are connected to both the company network and the Internet, and transmit large amounts of data to recording systems in the company or in the cloud. Implementation should be rigorously planned and ongoing monitoring implemented. Since these points are often neglected, IoT security cameras are often a target for hackers.

Internet-connected security cameras can be found everywhere these days - in public institutions, businesses and even in homes. The market is estimated to be around $2021 billion in 50 and is growing rapidly. Hundreds of thousands of IoT security cameras are installed and connected worldwide every day. These products are rapidly developed by manufacturers and equipped with intelligent sensors and advanced software. They have features like night vision, distance detection, and heat and motion detection. At the other end of the spectrum are less advanced home cameras that can be managed via smartphone applications.

Cameras are often vulnerable network devices

Most of the devices are Internet-connected security cameras or so-called CCTV (closed-circuit television) cameras, which are only connected to a limited number of monitors. However, both variants of video surveillance offer cyber attackers the opportunity to penetrate corporate networks as they are inherently vulnerable and serve as an easy entry point for hackers. So what are the risks posed by IoT security cameras and how can they be minimized?

Smart security cameras with AI

Many users may not initially be aware of the sensitive information that attackers can actually receive via their video surveillance. The IoT security cameras that are used in many companies today are higher-end cameras equipped with image and sound processing capabilities. Their recording systems provide text decoding and facial recognition capabilities. The devices not only record audiovisual data, but are also able to analyze and interpret them. These are then uploaded to the cloud, either for telemetry purposes or to be interpreted by analytics provided by AI services to add value.

The sensitive data flowing through the security cameras can expose operators to various privacy issues and open up opportunities for attackers to observe or eavesdrop on sensitive information. Attackers know that these security cameras and recording devices contain sensitive information that can be very lucrative in the right hands. This makes them a target and a security risk.

Hurdles and stumbling blocks in securing

Security cameras are connected to both the corporate network and the Internet and transmit large amounts of data to recording systems located within the company or in the cloud. A common practice for securing is network separation for connected IoT devices. However, this is extremely difficult for network administrators to accomplish, as the time required to perform it manually often outweighs the benefits. In addition, this is associated with high costs in the setup and operating phase. So there is nothing left but for these cameras to remain connected to the internal network voluntarily or as a result of a compromise. Also, in smaller businesses, there is often only a single network that is wirelessly accessible.

Another reason why these devices are so difficult to secure is that most IoT devices come installed with the manufacturer's firmware by default. This harbors a number of vulnerabilities, e.g. B. in the software caused by bugs or poor software development. To make matters worse, repairing or updating firmware always requires a code update. IoT device manufacturers are by no means necessarily security experts, and many of them prefer to offer lightweight software while ignoring the core principles of writing secure code.

Thoughtful implementation and cyber security

As a first guide to securing security cameras, the document Recommended Actions for Reducing Cyber ​​Risks from Security Cameras recently issued by the National Cyber ​​System in Israel. The document contains important recommendations that should be implemented by every organization. On top of that, it's a good idea to buy devices from reputable companies that build cyber defenses into their products "ex-factory" as early as the product development phase.

Implementation should also be rigorously planned, including ongoing monitoring, anomaly detection, and formulating update procedures for these devices. If you combine both aspects and carefully implement and continuously monitor security cameras from reliable providers, you minimize the risk of not detecting an attack until the damage has already been done.

More at CheckPoint.com

 


About check point

Check Point Software Technologies GmbH (www.checkpoint.com/de) is a leading provider of cybersecurity solutions for public administrations and companies worldwide. The solutions protect customers from cyberattacks with an industry leading detection rate for malware, ransomware and other types of attacks. Check Point offers a multi-level security architecture that protects company information in cloud environments, networks and on mobile devices, as well as the most comprehensive and intuitive “one point of control” security management system. Check Point protects over 100.000 businesses of all sizes.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Mobile spyware poses a threat to businesses

More and more people are using mobile devices both in everyday life and in companies. This also reduces the risk of “mobile ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more