Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Video SurveillanceCybersecurity News

The Importance of Cybersecurity in Modern Video Surveillance Environments

By Brandon Reich
cyber-camera-enews
September 25, 2018

For organizations to identify security threats and vulnerabilities, mitigate risk, ensure operational compliance and combat fraud, a comprehensive and innovative security approach is necessary. With today's evolving risk landscape and the increasing complexity and severity of cyber threats, we must take advantage of emerging technologies, strong internal operator and process policies, and advanced analytics must be used to protect customers, staff and assets.

Technology plays a key role in this effort, but because the sole purpose of these solutions is to make enterprises safer, one can often be blind to the level of security of the technology or device itself. In today's world, there are no exceptions to cybersecurity vulnerabilities, leaving surveillance and associated technology open to a variety of risks.

When you think of a video surveillance system, cybersecurity may not immediately come to mind, as hacking and malware are often thought of as separate from physical security devices. But the two are quickly becoming intertwined, as intruders are starting to use more sophisticated and unique methods to gain access to networks, data and assets.

It is therefore critical for security leaders to focus on securing every aspect of their network infrastructure, which includes confirming software updates and firmware on surveillance cameras are completed as available. In addition, as more and more physical security devices become connected through the Internet of Things (IoT), encryption and vulnerability testing are essential to ensure secure data transfer. A threat could enter from anywhere in an organization’s ecosystem and regardless of the nature of the attack, the cyber criminal’s goal is to exploit vulnerabilities quickly and profit from them.

With so much information to be protected, security leaders need to evaluate how to secure not only their video data but also the entire video surveillance system. In the past, this meant making sure best practices were enforced so that an individual could not physically tamper with a camera; however, now the focus also incorporates IT processes, such as ensuring that no one can access the camera and its data via the network. This marks quite a change from years past when cybersecurity wasn’t part of any physical security conversation. But the adoption of IP-connected devices makes a cyberattack a genuine possibility.

Cyber threats continue to increase and evolve in sophistication, and security leaders – both IT and physical – need to maintain a proactive approach to mitigating this risk. As we continue to move toward the connected world, new cyber vulnerabilities will come to light. As a vendor in the video surveillance market, we are entrusted to provide secure products and guidelines to safeguard our products from risks and this includes cyber vulnerabilities.

Cybersecurity Capabilities to Consider
One of the best ways to reduce network vulnerabilities associated with video surveillance systems is to ensure strong levels of data protection. Highly secure encryption and comprehensive role-based access control are two capabilities that elevate protection while meeting the compliance requirements of mission-critical environments.

Encryption is typically a resource-intensive process that requires more powerful servers to maintain video performance, resulting in the need for customers to purchase additional costly hardware. By leveraging software-based encryption, video system performance is maintained with nominal CPU overhead, eliminating additional hardware investments. Furthermore, the ability to manage workloads and encryption keys from a central location reduces complexity and helps organizations comply with regulations, hopefully avoiding the tsunami of “Do you want to stay in touch?” emails that GDPR caused!

Beyond encryption and mitigating the risk from the “human” element of security (it’s a long-proven fact that the majority of vulnerabilities come from within the network from a human making a mistake, or opening an email they weren’t supposed to), role-based access control is a comprehensive feature set that secures all aspects of a video surveillance infrastructure. This functionality allows only authorized individuals to have control over system management, and the ability to implement a cyber chain of command, while forensic logging and auditing help to achieve regulatory compliance.

I cannot stress enough that it is more important than ever to better harden access to your video surveillance infrastructure to provide increased visibility into and control over the environment.

In closing, security leaders need to evaluate what parameters work best for their environment while being cognizant of emerging risks and how to proactively address them. Regardless of your specific application, a secure, compliant video surveillance infrastructure enables organizations to maintain strict levels of cyber and physical security to ensure brand protection and data security, protecting business, employees and assets along the way.­­

KEYWORDS: cyber hardening cyberattack security video surveillance cybersecurity vulnerability assessment

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Brandon Reich is Senior Director of Surveillance Solutions at Pivot3

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • camera on side of blue building

    The growing importance of advanced video enhancement technologies

    See More
  • data center-enews

    Evaluating the Total Cost of Video

    See More
  • Cybersecurity Leadership Images

    The Importance of Securing Sensitive Data in a 5G World

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing