How to lock down your security system

The most important, but least recognized, steps organizations must take to make their security systems more cyber secure.

01 network

Keeping the network safe

As long as data is online there will always be concerns over cyber security. There are many steps a business can take to help better protect their physical security systems from cyber threats. From simple things like not using default or simple passwords, to more advanced steps like using PKI certificates and making sure you download the latest firmware - each are important to keeping your data, and your network, secure.

However, many times an IT department might not be taking all the necessary steps to consider protecting all devices on their network simply because they may not be aware of these solutions as part of the traditional network infrastructure. John Bartolac, senior manager of segment teams and cyber security for Axis Communications N.A., shares six important steps organizations should consider in addressing cyber risk mitigation across all network solutions.

02 education


Educating employees on cyber security risks is a step in the right direction to help better secure your systems. Many incidents could have been prevented if employees took the risks more seriously. Helping everyone involved understand steps such as the importance of using advance passwords and not default passwords along with regular assessment will go a long way to mitigate the risk of potential threats.

03 patch

Use security patches

Some breaches can be stopped before they are even started simply by downloading necessary security patches. Eighty-five percent of successful data breaches targeted the top 10 vulnerabilities which have never been patched.

04 mitigation

Risk mitigation

The cold hard truth is not all risks can be prevented. Organizations need to identify what the risks are and create a comprehensive plan on how to manage or accept certain risks. In some cases, keeping your network secure may mean applying more advanced hardening settings on devices or isolating the systems and the devices that hold too much of a risk.

05 encrypt


Use encrypted connections when possible, even on local networks. This makes it harder for hackers to retrieve and utilize critical information and data even if they are able to hack it.

06 access

Stop direct access

When it comes to surveillance cameras, limiting who can access the devices and footage can help reduce exposure. Don’t allow video clients to access cameras directly unless it is required by the system/solution. If they do need to connect, it should be done only through a VMS (Video Management System) or a media proxy/valid certificate.

07 itdept

Involve your IT department

IT departments have specific policies in place to address information security and system integrity. Teaming with the IT department and their IS teams will help ensure a pro-active way to address CVEs (Common Vulnerabilities and Exposures) and apply best practices in advance of potential threats.

Lock in your comments on our Facebook page.

MORE: Why the CSO needs to be involved in active shooter prep

Copyright © 2017 IDG Communications, Inc.

Related Slideshows