{"id":9011,"date":"2015-04-30T16:00:29","date_gmt":"2015-04-30T22:00:29","guid":{"rendered":"http:\/\/www.eagleeyenetworks.com\/?p=9011"},"modified":"2020-10-07T09:13:24","modified_gmt":"2020-10-07T14:13:24","slug":"siw-12-best-practices-for-securing-surveillance-networks-against-cyber-attacks","status":"publish","type":"post","link":"https:\/\/www.een.com\/pt-br\/blog\/siw-12-best-practices-for-securing-surveillance-networks-against-cyber-attacks\/","title":{"rendered":"SIW: 12 best practices for securing surveillance networks against cyber attacks"},"content":{"rendered":"<p><img decoding=\"async\" class=\"size-full wp-image-10183 alignleft\" src=\"https:\/\/www.een.com\/wp-content\/uploads\/2016\/03\/SecurityInfoWatch2.jpg\" alt=\"SecurityInfoWatch2\" width=\"130\" height=\"49\" srcset=\"https:\/\/www.een.com\/wp-content\/uploads\/2016\/03\/SecurityInfoWatch2.jpg 130w, https:\/\/www.een.com\/wp-content\/uploads\/2016\/03\/SecurityInfoWatch2-100x38.jpg 100w\" sizes=\"(max-width: 130px) 100vw, 130px\" \/>\u201cOur physical security systems &#8211; access control, fire alarms and video surveillance systems \u2013 basically have all kind of quietly become internet-connected,\u201d said Dean Drako, president and CEO of Eagle Eye Networks.<\/p>\n<p>\u201cWhen you\u2019re going to expose a machine to the internet, there\u2019s a certain set of responsibilities that go with that and I think that that is actually the biggest issue,\u201d he added.<\/p>\n<p><a href=\"https:\/\/www.securityinfowatch.com\/secured-cities\/article\/12070169\/eagle-eye-networks-whitepaper-outlines-12-best-practices-for-securing-surveillance-networks-against-cyber-attacks\" target=\"_target\" rel=\"noopener noreferrer\">Click Here<\/a> to read the article.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u201cOur physical security systems &#8211; access control, fire alarms and video surveillance systems \u2013 basically have all kind of quietly become internet-connected,\u201d said Dean Drako, president and CEO of Eagle &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/www.een.com\/pt-br\/blog\/siw-12-best-practices-for-securing-surveillance-networks-against-cyber-attacks\/\"> <span class=\"screen-reader-text\">SIW: 12 best practices for securing surveillance networks against cyber attacks<\/span> Leia mais &raquo;<\/a><\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","footnotes":""},"categories":[73],"tags":[],"class_list":["post-9011","post","type-post","status-publish","format-standard","hentry","category-company-news"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.een.com\/pt-br\/wp-json\/wp\/v2\/posts\/9011","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.een.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.een.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.een.com\/pt-br\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.een.com\/pt-br\/wp-json\/wp\/v2\/comments?post=9011"}],"version-history":[{"count":0,"href":"https:\/\/www.een.com\/pt-br\/wp-json\/wp\/v2\/posts\/9011\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.een.com\/pt-br\/wp-json\/wp\/v2\/media?parent=9011"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.een.com\/pt-br\/wp-json\/wp\/v2\/categories?post=9011"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.een.com\/pt-br\/wp-json\/wp\/v2\/tags?post=9011"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}