{"id":8982,"date":"2015-04-28T13:51:38","date_gmt":"2015-04-28T19:51:38","guid":{"rendered":"http:\/\/www.eagleeyenetworks.com\/?p=8982"},"modified":"2020-07-09T08:27:24","modified_gmt":"2020-07-09T13:27:24","slug":"12-security-camera-system-best-practices-for-cyber-protection","status":"publish","type":"post","link":"https:\/\/www.een.com\/fr\/blog\/12-security-camera-system-best-practices-for-cyber-protection\/","title":{"rendered":"12 Security Camera System Best Practices &#8211; Cyber Protection"},"content":{"rendered":"<p><em>Covers: Major Attack Vectors and 12 Cyber-Safe Best Practices for Security Camera Systems<\/em><\/p>\n<p><img decoding=\"async\" class=\"alignleft wp-image-10848\" src=\"https:\/\/www.een.com\/wp-content\/uploads\/2016\/04\/EE-Wings.jpg\" alt=\"EE Wings\" width=\"100\" height=\"108\" srcset=\"https:\/\/www.een.com\/wp-content\/uploads\/2016\/04\/EE-Wings.jpg 139w, https:\/\/www.een.com\/wp-content\/uploads\/2016\/04\/EE-Wings-93x100.jpg 93w, https:\/\/www.een.com\/wp-content\/uploads\/2016\/04\/EE-Wings-120x130.jpg 120w\" sizes=\"(max-width: 100px) 100vw, 100px\" \/>AUSTIN, Texas, April 30, 2015 \u2013 Eagle Eye Networks today announced the availability of its \u201c12 Security Camera System Best Practices for Cyber Protection\u201d white paper. The report covers the major vulnerabilities for security camera system and the twelve corresponding cyber security best practices. The best practices are designated according to whether the system is a true cloud solution, or a traditional DVR, NVR, or VMS systems that is connected to the Internet or corporate network.<\/p>\n<p>With video surveillance, you are typically protecting your employees and company assets. With today\u2019s increasingly internet-connected surveillance systems you need cyber protection or you will expose your company to serious threats, loss of customer data, and loss of company reputation.<\/p>\n<p>\u201cNot only are cyber breaches a major corporate expense, they can destroy the hard-built trust between companies and their customers,\u201d said Dean Drako, President and CEO at Eagle Eye Networks. \u201cAlmost 70% of IT is concerned with cyber-security for video surveillance systems. We created these best practices so companies can get a similar level of cyber protection on their video surveillance system as they target with their traditional IT systems.\u201d<\/p>\n<p>This white paper focuses on the best practices for internet-connected security camera systems and cloud-managed video surveillance. Many of these practices also apply to other physical security systems.<\/p>\n<p>The vulnerabilities and cyber-safe best practices for security camera systems covered are:<\/p>\n<ol>\n<li>Camera passwords<\/li>\n<li>Port forwarding<\/li>\n<li>Firewalls<\/li>\n<li>Network topology<\/li>\n<li>Operating systems<\/li>\n<li>Operating systems passwords<\/li>\n<li>Video surveillance system passwords<\/li>\n<li>Connection encryption<\/li>\n<li>Video encryption<\/li>\n<li>Mobile<\/li>\n<li>Physical access to equipment &amp; storage<\/li>\n<li>Video recording software<\/li>\n<\/ol>\n<p>The complete white paper can be downloaded here: <a href=\"https:\/\/www.een.com\/security-camera-system-cyber-best-practices\/\" target=\"_blank\" rel=\"noopener noreferrer\">12 Security Camera System Best Practices \u2013 Cyber Safe.<\/a><\/p>\n<p>Visit here to view Eagle Eye Networks Dean Drako\u2019s Video Highlights: <a href=\"https:\/\/www.youtube.com\/watch?v=RBqJOP-lLOI\" target=\"_blank\" rel=\"noopener noreferrer\">Security Camera System Best Practices for Cyber-Safety<\/a><\/p>\n<p><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/www.een.com\/wp-content\/uploads\/2015\/03\/Security-Camera-System-Cyber-Protection.png\" alt=\"Security Camera System Cyber Protection\" width=\"275\" \/><\/p>\n<p><strong>About Eagle Eye Networks<\/strong><\/p>\n<p>Eagle Eye Networks delivers the first on-demand cloud based security and business intelligence video management system (VMS) providing both cloud and on-premise recording. Eagle Eye also provides a cloud video API for integrations and application development. The Eagle Eye Platform offers secure, encrypted recording, camera management, mobile viewing and alerts \u2013 all 100% cloud managed. The Eagle Eye <a href=\"https:\/\/www.een.com\/product\/cloud-vms-system-overview\/\" target=\"_blank\" rel=\"noopener noreferrer\">Cloud Security Camera Video Management System<\/a> supports a broad array of IP and analog cameras uses Intelligent Bandwidth Management\u2122, making it easy to deploy at single and multiple sites. The API platform uses the Eagle Eye, Big Data Video Framework\u2122, with time based data structures used for indexing, search, retrieval and analysis of the live and archived video. Eagle Eye Networks sells through authorized reseller and installation partners. The headquarters is at 411 Brazos St, Suite 101, Austin, TX. For more information, please visit www.een.com or call +1-512-473-0500.<\/p>\n<p align=\"center\">###<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Covers: Major Attack Vectors and 12 Cyber-Safe Best Practices for Security Camera Systems AUSTIN, Texas, April 30, 2015 \u2013 Eagle Eye Networks today announced the availability of its \u201c12 Security &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/www.een.com\/fr\/blog\/12-security-camera-system-best-practices-for-cyber-protection\/\"> <span class=\"screen-reader-text\">12 Security Camera System Best Practices &#8211; Cyber Protection<\/span> Lire la suite\u00a0\u00bb<\/a><\/p>\n","protected":false},"author":5,"featured_media":23233,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","footnotes":""},"categories":[74],"tags":[],"class_list":["post-8982","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-press"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.een.com\/fr\/wp-json\/wp\/v2\/posts\/8982","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.een.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.een.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.een.com\/fr\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.een.com\/fr\/wp-json\/wp\/v2\/comments?post=8982"}],"version-history":[{"count":0,"href":"https:\/\/www.een.com\/fr\/wp-json\/wp\/v2\/posts\/8982\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.een.com\/fr\/wp-json\/wp\/v2\/media\/23233"}],"wp:attachment":[{"href":"https:\/\/www.een.com\/fr\/wp-json\/wp\/v2\/media?parent=8982"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.een.com\/fr\/wp-json\/wp\/v2\/categories?post=8982"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.een.com\/fr\/wp-json\/wp\/v2\/tags?post=8982"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}