{"id":12158,"date":"2016-10-31T07:00:27","date_gmt":"2016-10-31T13:00:27","guid":{"rendered":"http:\/\/www.eagleeyenetworks.com\/?p=12158"},"modified":"2020-08-11T14:04:28","modified_gmt":"2020-08-11T19:04:28","slug":"halloween-scary-compromised-dvrs","status":"publish","type":"post","link":"https:\/\/www.een.com\/nl\/blog\/halloween-scary-compromised-dvrs\/","title":{"rendered":"Are You Afraid of Your DVR?"},"content":{"rendered":"<p>You should be if it&#8217;s connected to the internet. It could be the doorway for hackers to access your entire network. Once a DVR is compromised, it can be used for many types of nefarious activities.<\/p>\n<p>These activities include:<br \/>\n\u2022 Stealing private or confidential information<br \/>\n\u2022 Crashing your networks or servers<br \/>\n\u2022 Attacking other IoT devices in your network<br \/>\n\u2022 Locating other servers on the network, and introducing viruses<br \/>\n\u2022 Connecting to and accessing your file servers or email servers<br \/>\n\u2022 Watching your cameras live and\/or streaming them to the Internet<br \/>\n\u2022 Downloading historic video<br \/>\n\u2022 Stealing credit card information and other PCI compliance issues<br \/>\n\u2022 Disabling video recording and camera operation<br \/>\n\u2022 Introducing a virus to create more bots in your network<br \/>\n\u2022 Attacking your network and disabling it<br \/>\n\u2022 Opening and closing of physical doors to grant access via access control system<\/p>\n<p>If your DVR has been compromised, you will need to contact the manufacturer for the tools to rid the device of these serious risks. If your manufacturer does not provide anything to solve the problem, you will be forced to replace the DVR.<\/p>\n<p>Eagle Eye Networks mitigates security concerns from the point of product research, development and deployment, so there aren&#8217;t any issues for installers or customers. If you would like to learn more about Eagle Eye&#8217;s solution, please read our <a href=\"https:\/\/www.een.com\/cyber-security-cloud-video-surveillance\/\">Cyber Security White Paper<\/a>.<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignleft size-large\" src=\"https:\/\/www.een.com\/wp-content\/uploads\/2016\/10\/Afraid-of-the-DVR.jpg\" alt=\"dvr\" width=\"1000\" height=\"943\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>You should be if it&#8217;s connected to the internet. It could be the doorway for hackers to access your entire network. Once a DVR is compromised, it can be used &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/www.een.com\/nl\/blog\/halloween-scary-compromised-dvrs\/\"> <span class=\"screen-reader-text\">Are You Afraid of Your DVR?<\/span> Lees verder &raquo;<\/a><\/p>\n","protected":false},"author":3155,"featured_media":13217,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","footnotes":""},"categories":[230],"tags":[1273,1276,1272],"class_list":["post-12158","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-cloud-video-surveillance","tag-cybersecurity","tag-video-management-software"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.een.com\/nl\/wp-json\/wp\/v2\/posts\/12158","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.een.com\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.een.com\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.een.com\/nl\/wp-json\/wp\/v2\/users\/3155"}],"replies":[{"embeddable":true,"href":"https:\/\/www.een.com\/nl\/wp-json\/wp\/v2\/comments?post=12158"}],"version-history":[{"count":0,"href":"https:\/\/www.een.com\/nl\/wp-json\/wp\/v2\/posts\/12158\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.een.com\/nl\/wp-json\/wp\/v2\/media\/13217"}],"wp:attachment":[{"href":"https:\/\/www.een.com\/nl\/wp-json\/wp\/v2\/media?parent=12158"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.een.com\/nl\/wp-json\/wp\/v2\/categories?post=12158"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.een.com\/nl\/wp-json\/wp\/v2\/tags?post=12158"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}