Tackling Cybersecurity Challenges in the Age of IoT

Tackling Cybersecurity Challenges in the Age of IoT

With the rapid adoption of the Internet of Things (IoT), we are moving towards an entirely interconnected world, from smart organizations to smart cities. No one can disagree with the power that IoT presents. However, as we become more and more reliant on web-based services and connected devices, we run the risk of making ourselves more vulnerable than ever, if we fail to recognize the importance of cybersecurity in relation to IoT.

According to the technology research firm Gartner, more than 25% of cyber-attacks will involve IoT by 2020. The cyber-attacks on the FBI and American Department of Homeland Security in early 2016 are harsh reminders that cybersecurity is a very real and pressing concern, regardless of the size of the organization. Unfortunately, this trend isn’t set to slowdown as many organizations still have a long way to go to make sure their physical security systems are truly secure.

Trust Issues

The deployment of internet connected devices, including IP security cameras, needs to be strategically thought out together with wide-scale collaboration, responsibility, openness, accessibility and most of all trust between all relevant parties - manufacturers, systems integrators, consultants, IT departments and cybersecurity specialists.

Without adequate security, these connected devices provide a gateway into personal, corporate, and governmental networks where confidential data can be stolen or vicious malware planted.

While companies are painfully aware of the importance of cybersecurity, in practice they are still not vigilant enough in regularly reviewing and enhancing industry security standards and practices to protect both themselves and their clients in an increasingly complex and threating environment.

The cybersecurity incidents that keep occurring are most often associated with products designed to provide maximum convenience to the customer, even if it meant loosening security policies (non-complex password setting policy, remote access and support capability). While providing convenience to customers, the security industry needs to implement the right level of security policies that protect our customers’ information. We are finally seeing these changes taking place across the industry as end users are increasingly reluctant to buy products from manufacturers whose products have been compromised through recent vulnerability incidents.

Keeping the Bad Guys Out

As with any software solution that resides on a network, security systems and edge devices are susceptible to a variety of attacks. Hacking a security system can take any number of forms, including brute-force, packet-sniffing, and man-in-the-middle attacks. In some cases, particularly with man-in-the-middle attacks, hackers are able to “listen in” and alter communication that the participants believe is secure.

When it comes to protecting your cameras from unwanted attacks, there are a number of steps you can take. From changing password defaults and using authentication to proper network set up and configuration to knowing how to identify and thwart attacks, there are true and tested solutions for securing all aspects of your physical security system.

When choosing an IP-based security solution, it is crucial to scrutinize and evaluate the manufacturer’s cybersecurity policies—what are their principles and practices? Do the built-in security mechanisms offered in their solutions use multi-layered encrypted communications, data protection capabilities, and strong user authentication and password protection? How hardened are the physical components inside the device? These measures help protect organizations and their customers against malicious attacks. They also ensure only those with defined privileges will be able to access or use resources, data and applications.

Without proper protection, the size, scope and severity of cyber threats and attacks will likely increase over time. But there are solutions. While the advancement of technology has the potential to increase system vulnerability, it also carries with it the ability to protect. At Hanwha, we are committed to working with our customers to ensure that our innovation delivers the best possible protection now and in the future. After all, security is what we do.

How to Get Better Educated

Professionals can get information from manufacturers such as Hanwha, to educate themselves on network hardening, and closing vulnerabilities. Hanwha offers white papers, seminars and training on cybersecurity. Additionally, various forms of media available in the public domain can help professionals gain a stronger understanding on best practices for establishing security policies. Relevant educational facilities and programs are hard to find but they are helpful in understanding the latest industry and cybersecurity trends at various security seminars / conferences.

The Hanwha Difference

At Hanwha, we take cybersecurity very seriously. We have a large team of engineers in our Korean R&D center dedicated to cybersecurity to ensure products meet our high standards and to investigate field concerns or newly discovered issues. This allows us to respond quickly, release patch fixes, and address any security vulnerabilities. Our website has a dedicated landing page for cybersecurity, which includes our Security Vulnerability Disclosure Policy, as well as reports clearly documenting any vulnerabilities discovered and the corrective actions to secure the devices.

We conduct tests on our network products using one of the leading 3rd party companies in penetration testing. We routinely monitor and diagnose our products to strengthen security and minimize vulnerabilities while managing product passwords, protocols and algorithms.

Our best practices include: ensuring proven encryption algorithms and secure coding is used, the removal of unused services and daemons, not using backdoors, the removal of default passwords, password guessing locks, firmware encryption and more. We have also updated many of our factory default settings to harden our devices even further. 

In addition, we have published a cybersecurity hardening guide and white paper to describe best practices in securing network products.  We regularly conduct trainings and webinars on cybersecurity for end users and system integrators to ensure they understand best practices.

We develop the mission critical parts of our products ourselves from the camera optics to our own chipsets, so we can ensure higher levels of quality control and ultimately increase security for our customers. A core benefit for us is our Wisenet SoC (system on a chip) that we continually develop specifically for our security cameras. We are not as reliant on off-the-shelf, potentially vulnerable, components and technology, compared to competing vendors. We also have active education/training programs for our systems integrators and partners, and have recently launched a new Wisenet certification program which contains a focused section on cybersecurity.

Conclusion

The very devices that are designed to protect customers' property and personal information are increasingly used as a means of seizing sensitive personal and corporate information. It is important not to view cybersecurity as just one person’s or one department’s job: it is a collective responsibility that needs to be taken seriously by every single one of us, including manufacturers, systems integrators and end users. As security professionals, we all need to be confident that our systems are secure from both a physical and a cyber perspective. To build this confidence, systems integrators and end users should partner with trusted companies and vendors that have strong cyber security policies, dedicated resources, and a clearly articulated plan for combating security vulnerabilities.

Employing these best practices not only can prevent networked video devices and systems from serving as entry points, but also ensures the integrity and continued operation of this critical function – ensuring the ongoing safety and security of people and assets.

Featured

Featured Cybersecurity

Webinars

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3