Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Leadership and ManagementVideo SurveillanceCybersecurity News

3 Steps to Improve Physical Security Systems' Cybersecurity

A Q&A with UL's Gonda Lamberink about Cyberattacks, Video Surveillance, Supply Chains and Upcoming Regulation

Video Surveillance and Cybersecurity
Gonda Lamberink, cybersecurity senior business development manager at UL
Video Surveillance and Cybersecurity
Gonda Lamberink, cybersecurity senior business development manager at UL
October 9, 2018

As networked video surveillance solutions continue to take over the market, the security vulnerabilities in what were once considered solely physical security systems grow. As each IP camera becomes another endpoint in an enterprise’s digital footprint, they can each potentially open up a backdoor into the network and the business’s mission critical data and services.

By 2020, more than a quarter of cyberattacks in the enterprise will involve IoT devices, including connected video cameras, Gartner estimates.

Camera manufacturers, service providers and installers are paying attention – many booths at the recent GSX conference heavily emphasized their investment in cybersecurity – but it’s still largely up to the end user to demand transparency into cybersecurity processes, supply chains and installation best practices.

Security connected with Gonda Lamberink, cybersecurity senior business development manager at UL (Underwriters Laboratories) to discuss what next steps need to be taken at the manufacturer and enterprise levels to improve surveillance systems’ cybersecurity, as well as upcoming regulatory efforts.

 

Security: From a broad perspective, how does cybersecurity impact video surveillance cameras, and why should security end users be interested? What are some of the potential risks?

Lamberink: There is a growing market need for security and safety systems. Technological advancements, such as 4K resolution, edge-based video analytics and penetration of H.265 high-efficiency video encoding is enabling higher quality surveillance equipment products. On the demand side, and enabled by this technology push, there are government investments to improve security infrastructure, building operators’ increased adoption of security cameras, and a rise in demand from smart-home owners, for example for integration with home access control systems.

Increased digitization means that cameras become smarter, more interconnected and have more software. As a consequence, cameras also are more vulnerable to cyber threats. Traditional network security, like network segmentation and firewalls, are no longer sufficient to address these threats. Cameras themselves need to be designed with security in mind and go through security testing and evaluation. E.g. cameras can be compromised due to security issues, which can lead to unauthorized access to networks and service disruption, through distributed denial of service (DDoS) attacks.

Security risks that can materialize if security issues are effectively exploited include:

  • Successful brute-force attacks, e.g. against the camera-registering system to guess camera serial numbers;
  • Authentication bypasses, to gain access to the device and/or register new user accounts;
  • Access to live video and audio feeds, e.g. detecting camera presence based on public IP addresses accessible on the Internet and exploiting insecure protocols;
  • Access the device and enable hidden functionality; or
  • Gain access and use a compromised camera as a stepping stone to the rest of a network, e.g. performing large-scale automated DDOS attacks.

Security: What are some steps that the security technology ecosystem – from manufacturers to installers to end users and associations – can do to improve cybersecurity on these devices?

Lamberink: Manufacturers can start designing their cameras with security in mind. Examples of easy-to-implement fixes include:

  • Strong password management, including the use of random default passwords and password reset;
  • Avoiding use of insecure protocols where possible, or otherwise mitigate associated risks; and
  • Removing unsafe input processing and unnecessary hidden functionality.

Manufacturers should perform security testing to detect vulnerabilities and provide end user guidance on how to securely configure a camera. End users should make an effort to understand this guidance and look for evidence of implementation of security features and security testing, for example by checking whether the camera is UL 2900 certified for security: https://industries.ul.com/cybersecurity.

They should also ensure to download the most recent firmware versions made available to them by manufacturers. Associations can help by taking input from security experts on security best practices and standards and promote these among their member base. It is critical that associations, security experts, manufacturers, installers/integrators and end users work together to ensure baseline security levels.

Security: How is the international supply chain for surveillance devices making cybersecurity even more challenging?

Lamberink: Closer collaboration between end users, OEMs and ODMs mandating security testing to best practice requirements is important, also across sometimes complex supply chains. Start with baseline security requirements, emphasize a secure Software Development LifeCycle (sSDLC) and roll out security evaluations to commonly understood and shared security best practices and standards. Enable “voting with wallets” by providing “buyers” sufficient security information about the products and components they source.

Security design and testing comes at a cost, but this is balanced against the cost of data breaches, network security compromises and brand reputation damage.

Security: What are some regulatory issues that affect video surveillance device cybersecurity today, and what should end users in particular be aware of?

Lamberink: There is no regulation today yet mandating security design or testing for video surveillance or a range of other IoT ecosystems. There is more indirect impact from regulation though such as when the U.S. House of Representatives earlier this year passed a bill including a ban on government’s use of Dahua and Hikvision, two leading Chinese surveillance equipment manufacturers, over growing awareness and concern with Chinese government control, security backdoors and increased global hacking attacks.

Another example is the European General Data Protection Regulation (GDPR). A video recording of an identifiable person is part of an individual’s personal data and privacy regulation calling for proportionate use and protection of that data is impacting video surveillance manufacturers and operators.

Security: What can end users do to ensure the devices they’re purchasing and installing conform to cybersecurity standards and good practices?

Lamberink: As mentioned above, end users should look for evidence of implementation of security features and security testing. Furthermore they should:

  • Keep firmware and software up-to-date.
    • Manufacturers will make fixes and patches for vulnerabilities available. Yet, these will not be effective unless end users and installers / integrators download them onto the cameras.
  • Apply user names and passwords.
    • Do not keep any default settings, but change these to unique user names and sufficiently strong passwords. Hackers may only need the IP address of a camera to access it through the internet remotely if they can use a default password.
  • Use network segmentation.
    • Put your cameras and other critical I(o)T systems behind routers and firewalls.

Security: How is UL participating in this discussion and the development of standards?

Lamberink: UL has promoted UL 2900 certification including for surveillance equipment. Next to UL 2900-1, which is an ANSI standard, UL has published a 2900-2-3 standard outline of investigation, targeting building security. UL 2900-2-3 compared to UL 2900-1 has different levels of security assurance with Level 1 as a minimum level of assessment and Level 3, next to an assessment of the product also adding organizational security requirements. This is based on industry preferences to have various options depending upon the need and application of the deployment of building security products.

The market and surveillance equipment manufacturers benefit from:

  • Cybersecurity certification with assurance that is gained when a product is measured against an established product baseline for cyber protection;
  • Common criteria for cybersecurity that can be used for product selection; and
  • The proven quality and trust that UL certifications are globally recognized for.

Security: How can security professionals throughout the industry help?

Lamberink: We should keep in mind that security awareness is emerging in different IoT ecosystems, including video surveillance.

Manufacturers and their customers still focus a lot more on functionality, time-to-market and other competitive differentiators, not necessarily including security. In residential homes, consumers still do not consider that a vulnerability in a surveillance camera or a door lock can have an impact on their safety and security. Awareness is growing though under pressure of increased hacking attacks, and security features and resilience to cyberattacks that a camera can offer are becoming more of a differentiator.

The industry needs time to improve security, and UL, along with security professionals employed by manufacturers and operators or acting as independent experts, is helping and contributing to this. UL works to create a common understanding of threats and security risks and from there derive the appropriate baseline security requirements that we validate as part of security testing and certification.

KEYWORDS: cybersecurity compliance cybersecurity preparedness security technology surveillance cybersecurity surveillance solutions

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • hospital cyber security

    6 steps to improve healthcare cybersecurity

    See More
  • document security

    How to improve legal document security in six steps

    See More
  • 3 Steps to Better Cybersecurity Training; cybersecurity training, cyber security news, security education, cybersecurity awareness

    3 Steps to Better Cybersecurity Training

    See More

Related Products

See More Products
  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

See More Products

Events

View AllSubmit An Event
  • March 6, 2025

    Why Mobile Device Response is Key to Managing Data Risk

    ON DEMAND: Most organizations and their associating operations have the response and investigation of computers, cloud resources, and other endpoint technologies under lock and key. 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!