{"id":12941,"date":"2017-01-31T12:07:36","date_gmt":"2017-01-31T18:07:36","guid":{"rendered":"http:\/\/www.eagleeyenetworks.com\/?p=12941"},"modified":"2020-08-11T14:04:07","modified_gmt":"2020-08-11T19:04:07","slug":"cyber-attack-washington-d-c-cameras","status":"publish","type":"post","link":"https:\/\/www.een.com\/sv\/blog\/cyber-attack-washington-d-c-cameras\/","title":{"rendered":"Cyber Attack &#8211; D.C. Cameras"},"content":{"rendered":"<p>Over the past few months, more and more IOT devices, including DVRs, and cameras, are being reportedly compromised and proven vulnerable to cyber attacks.<\/p>\n<p>Most recently, the Washington Post reported that unidentified hackers managed to compromise almost 70% of the D.C. police closed-circuit surveillance cameras eight days prior to the Presidential inauguration. According to the Washington Post, D.C. police noticed four camera sites were not functioning properly, and upon further investigation, two forms of ransomware were found in the recording devices. In total, the cyber-attack affected 123 of 187 network video recorders. In order to resolve the matter, the city was forced to take all those devices offline, remove all the software, and restart the system at each site. All and all, this resulted in video surveillance being inaccessible to authorities for over 48 hours.<\/p>\n<p>In order to help minimize the risk of cyber attacks on your video surveillance infrastructure, we recommend that you take these two important measures:<\/p>\n<ol>\n<li><span style=\"text-decoration: underline;\">Change default passwords<\/span>: Make sure that default logins and passwords are changed from factory defaults, and have strong passwords in place for all of your IP cameras and network video recorders.<\/li>\n<li><span style=\"text-decoration: underline;\">Keep software and firmware up to date<\/span>: These releases often contain patches for security vulnerabilities, so keeping these up to date will minimize risk.<\/li>\n<\/ol>\n<p>Washington Post article:<br \/>\n<a href=\"http:\/\/wapo.st\/2kNYqnO\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/wapo.st\/2kNYqnO<\/a><\/p>\n<p>Eagle Eye Networks\u2019 Security Video Management System is built to withstand cyber-attacks. Our system only makes outbound connections to the cloud, making it impossible for hackers to reach your information.<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"size-full wp-image-39972 alignnone\" src=\"https:\/\/www.een.com\/wp-content\/uploads\/2017\/01\/washingtondc.jpg\" alt=\"\" width=\"1024\" height=\"684\" srcset=\"https:\/\/www.een.com\/wp-content\/uploads\/2017\/01\/washingtondc.jpg 1024w, https:\/\/www.een.com\/wp-content\/uploads\/2017\/01\/washingtondc-300x200.jpg 300w, https:\/\/www.een.com\/wp-content\/uploads\/2017\/01\/washingtondc-100x67.jpg 100w, https:\/\/www.een.com\/wp-content\/uploads\/2017\/01\/washingtondc-195x130.jpg 195w, https:\/\/www.een.com\/wp-content\/uploads\/2017\/01\/washingtondc-200x134.jpg 200w, https:\/\/www.een.com\/wp-content\/uploads\/2017\/01\/washingtondc-400x267.jpg 400w, https:\/\/www.een.com\/wp-content\/uploads\/2017\/01\/washingtondc-600x401.jpg 600w, https:\/\/www.een.com\/wp-content\/uploads\/2017\/01\/washingtondc-800x534.jpg 800w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Over the past few months, more and more IOT devices, including DVRs, and cameras, are being reportedly compromised and proven vulnerable to cyber attacks. Most recently, the Washington Post reported &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/www.een.com\/sv\/blog\/cyber-attack-washington-d-c-cameras\/\"> <span class=\"screen-reader-text\">Cyber Attack &#8211; D.C. Cameras<\/span> L\u00e4s mer &raquo;<\/a><\/p>\n","protected":false},"author":3155,"featured_media":40000,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","footnotes":""},"categories":[230],"tags":[1273,1276,1272],"class_list":["post-12941","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-cloud-video-surveillance","tag-cybersecurity","tag-video-management-software"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.een.com\/sv\/wp-json\/wp\/v2\/posts\/12941","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.een.com\/sv\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.een.com\/sv\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.een.com\/sv\/wp-json\/wp\/v2\/users\/3155"}],"replies":[{"embeddable":true,"href":"https:\/\/www.een.com\/sv\/wp-json\/wp\/v2\/comments?post=12941"}],"version-history":[{"count":0,"href":"https:\/\/www.een.com\/sv\/wp-json\/wp\/v2\/posts\/12941\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.een.com\/sv\/wp-json\/wp\/v2\/media\/40000"}],"wp:attachment":[{"href":"https:\/\/www.een.com\/sv\/wp-json\/wp\/v2\/media?parent=12941"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.een.com\/sv\/wp-json\/wp\/v2\/categories?post=12941"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.een.com\/sv\/wp-json\/wp\/v2\/tags?post=12941"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}