Cybersecurity Defense Strategies for Video Management Systems

As engineers, integrators, and administrators of IP video management and other network-based security systems, we have a very heavy reliance on the network. Edge devices of all types, and especially cameras, are a vulnerable part of a network. Any video security system design must take this into account. And because one solution does not fit all applications or address all threats, a multi-layered approach is best for deploying an optimally functional and secure network.

Unauthorized access to a video security network can impact system confidentiality, integrity and availability. Security flaws within IT-attached devices could potentially provide a platform from which to launch attacks at other IT systems. It must be acknowledged that all systems contain vulnerabilities, and that there are external as well as internal attackers looking for ways to exploit these vulnerabilities.

System Hardening

Developing and implementing security measures and best practices is known as “hardening.” Hardening is a continuous process of identifying and understanding security risks and taking appropriate steps to counter them. The process is dynamic because the threats and the systems they target, are continuously evolving.

Most hardening information focuses on IT settings and techniques, but it’s important to remember that physical security, education, and awareness, are also a vital part of hardening. For example, use physical barriers to servers and client computers, and make sure that things like camera enclosures, locks, tamper alarms, and access controls are secure. Actionable steps for hardening a video management system include:

• Understanding what components need to be protected
• Hardening surveillance system components including servers, client computers, and devices
• Documenting and maintaining software updates and security settings for each system
• Training and investing in the right people and skills — including the supply chain

Fortunately, there are proven, standardized frameworks available that systematically bring together best practices. There's no reason for video surveillance and security professionals to re-invent the wheel. Taking an IT industry standards approach makes it easy to design and deploy secure video networks. Here are several security topics often overlooked by video surveillance professionals.

Brute Force Attack

A brute force attack is a trial-and-error method used to obtain information such as user passwords or PIN numbers. Hackers use software that tries different character combinations in quick succession to crack passwords. Short and simple passwords—those that only use alphabetical characters—are easier to break than longer passwords with a mix of letters, numbers and special characters. Hackers often persist for hours, days, or even years in finding a way into a target.

Edge devices are some of the most vulnerable pieces in VMS installations. This is especially true if the installer leaves the default password unchanged. While isolating the device network from other networks is the best way to prevent unauthorized access to devices, we should still remember to change those default passwords. Most device manufacturers have tools to do this in a quick batch job. Some VMS vendors also have their own tools to do this directly from the VMS administration interface. It can even be done on a regular time interval, as required in some jurisdictions. Changing passwords directly from the VMS saves the installer from having to enter the password in two separate locations. Password complexity and length can be adjusted to a level that makes brute-forcing a poor strategy.

Active Directory

Active Directory is a Windows OS directory service that facilitates working with interconnected network resources. Centralizing user and computer management into Active Directory (AD) can improve security in many ways. For one, user authentication can be handled by AD, which has protections against brute-force attacks. Group Policy can be used to manage many everyday IT security tasks like password policy and computer security settings. Kerberos authentication adds another level of security. More than anything else, Active Directory can help with eliminating mistakes that can happen in distributed systems where IT staff needs to perform the same work on multiple machines, one by one.

Perhaps the most important mistake from a cybersecurity perspective is user management. Having multiple user accounts on different systems can be difficult and time-consuming to manage. By using a centralized system like Active Directory, users can be added and deleted in just one place and the change is propagated across the entire organization. This stops former employees and contractors from gaining access when they shouldn’t have it anymore.

Network segmentation

Segmentation is an effective but often overlooked network arrangement. In it, different networks are separated from each other by a firewall appliance, or by total isolation. Does the accounting team need access to the VMS, and vice versa? By focusing on the least privilege principle, we shouldn’t allow users (and computers) access to resources they don’t need to get their job done. By implementing a segmented network approach, we can centralize what is allowed to pass from one segment to another.

In the VMS industry, a total isolation is often the standard approach. This is a terrific way to eliminate all kinds of threats originating from other networks. While it isn’t an excuse to forget about security, it reduces many of the most prevalent threats.

Encryption

One of the most important security improvements we have seen both on the web and the VMS space over the last several years is encrypting everything. It’s hard to find websites that don’t encrypt traffic, whether it’s sensitive or not. Some might even argue that the encryption mania has gone too far. However, when the data is sensitive and there is a chance for unauthorized access either by eavesdropping network traffic, or accessing stored data, encryption is the right tool to protect it.

Different VMS systems implement data flow differently, so one strategy won’t work for everyone. As a rule of thumb, we can think of device data flowing through multiple steps. First it is received over the network by a recording server. Then, it may or may not be recorded on disk depending on the system configuration. Client applications request live or recorded data on demand. Finally, if deemed necessary, the data may have to be exported for handing over to authorities. All of these stages pose cybersecurity risks as well as privacy risks for the subjects in the data. Using encryption in every stage avoids unauthorized access.

Physical Layer Compromise

Many company server rooms and data centers have easy-to-exploit physical vulnerabilities that don't require hacking into the network. Physical access bypasses most security measures, whether intruders are simply looking to vandalize the servers, or do something more sophisticated.

Some of the ways of gaining access simply include accessing improperly installed doors or windows, picking locks, crawling through void spaces in the walls or above false ceilings, and “tailgating" into the building by posing as a contractor or vendor.

Server rooms shouldn’t be the only concern. If access is available on any available network socket, it should be considered a risk. Also, unplugging existing equipment and connecting the attacker’s own equipment can give unauthorized access.

For optimum physical protection, a combination of multiple security strategies is needed, including the use of professional-grade access control systems and locks requiring authentication, proper wall and structure design that reduces void spaces and presents physical barriers. Alarm sensors placed within potential access points is a good strategy as well. And of course, clear and detailed, documented security and access polices must be established, communicated with employees and strictly followed.

Stay Informed and Up to Date

A critical component of defending against attacks and vulnerabilities is to simply stay informed and up to date. IT and security managers need to be aware of issues that affect software and hardware, including operating systems, mobile devices, cameras, storage devices, and network devices. It’s important to keep current on common vulnerabilities and exposures for all system components, and to communicate with manufacturers and security professionals often.

However, education and awareness shouldn’t be limited to security and IT staff alone. Everyone needs to have a basic level of understanding of threats against our own human behavior. Why are phishing e-mails and other types of e-mail scams so common? Because there’s always someone who is clicking on those links. The same applies in a physical setting. If your company’s receptionist meets a visitor who forgot to print something for a meeting they are having, should he or she insert the USB stick with said files to a company computer? No. There’s a good chance it contains some kind of malware that could spread across the organization.

As long as we humans are such an easy target, attackers are going to take advantage of it. Systems integrators and organizations of all sizes must adopt policies and proven IT network best practices to combat various threats. Educating employees about these common threats is as important as all the technical protections we can apply.

Featured

  • Security Today Announces 2025 CyberSecured Award Winners

    Security Today is pleased to announce the 2025 CyberSecured Awards winners. Sixteen companies are being recognized this year for their network products and other cybersecurity initiatives that secure our world today. Read Now

  • Empowering and Securing a Mobile Workforce

    What happens when technology lets you work anywhere – but exposes you to security threats everywhere? This is the reality of modern work. No longer tethered to desks, work happens everywhere – in the office, from home, on the road, and in countless locations in between. Read Now

  • TSA Introduces New $45 Fee Option for Travelers Without REAL ID Starting February 1

    The Transportation Security Administration (TSA) announced today that it will refer all passengers who do not present an acceptable form of ID and still want to fly an option to pay a $45 fee to use a modernized alternative identity verification system, TSA Confirm.ID, to establish identity at security checkpoints beginning on February 1, 2026. Read Now

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.