{"id":141455,"date":"2022-05-20T12:00:45","date_gmt":"2022-05-20T17:00:45","guid":{"rendered":"https:\/\/www.een.com\/?p=141455"},"modified":"2022-05-24T12:05:03","modified_gmt":"2022-05-24T17:05:03","slug":"video-surveillance-cyber-risk-more-devices-more-problems","status":"publish","type":"post","link":"https:\/\/www.een.com\/sv\/blog\/video-surveillance-cyber-risk-more-devices-more-problems\/","title":{"rendered":"Video Surveillance &#038; Cyber Risk: More Devices, More Problems?"},"content":{"rendered":"\n<p>While sophisticated IP cameras are capable of doing more than ever, they can also be more vulnerable to hacking \u2014 and vendors, integrators, and customers must all be vigilant to keep things safe.<\/p>\n\n\n\n<p> In today\u2019s interconnected security industry, there are more cameras, IoT, and edge devices \u201ctalking\u201d to each other than ever before. Modern IP cameras have powerful processing, networking, and storage capabilities that make them incredibly versatile, while cloud technology enables more data storage, and the internet connects them all.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link\" href=\"https:\/\/www.sdmmag.com\/articles\/100777-video-surveillance-and-cyber-risk-more-devices-more-problems\" target=\"_blank\" rel=\"noreferrer noopener\">Read the full article<\/a><\/div>\n<\/div>\n\n\n\n<h3 class=\"wp-block-heading\">In the News<\/h3>\n\n\n\n<p><br>By <a href=\"https:\/\/www.sdmmag.com\/authors\/1796-laura-toops\" target=\"_blank\" rel=\"noreferrer noopener\">Laura Mazzuca Toops<\/a><br><em>Covered on these news sites. Click the image to read more.<\/em><\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/www.een.com\/wp-content\/uploads\/2016\/04\/sdm-logo.png\" alt=\"sdm-logo\" class=\"wp-image-13476\" width=\"195\" height=\"46\" srcset=\"https:\/\/www.een.com\/wp-content\/uploads\/2016\/04\/sdm-logo.png 390w, https:\/\/www.een.com\/wp-content\/uploads\/2016\/04\/sdm-logo-300x71.png 300w, https:\/\/www.een.com\/wp-content\/uploads\/2016\/04\/sdm-logo-100x24.png 100w, https:\/\/www.een.com\/wp-content\/uploads\/2016\/04\/sdm-logo-200x47.png 200w\" sizes=\"(max-width: 195px) 100vw, 195px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>While sophisticated IP cameras are capable of doing more than ever, they can also be more vulnerable to hacking \u2014 and vendors, integrators, and customers must all be vigilant to &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/www.een.com\/sv\/blog\/video-surveillance-cyber-risk-more-devices-more-problems\/\"> <span class=\"screen-reader-text\">Video Surveillance &#038; Cyber Risk: More Devices, More Problems?<\/span> L\u00e4s mer &raquo;<\/a><\/p>\n","protected":false},"author":3155,"featured_media":13407,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"4139,4147,4823,4827,4829,4831","_relevanssi_noindex_reason":"","footnotes":""},"categories":[73],"tags":[],"class_list":["post-141455","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-company-news"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.een.com\/sv\/wp-json\/wp\/v2\/posts\/141455","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.een.com\/sv\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.een.com\/sv\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.een.com\/sv\/wp-json\/wp\/v2\/users\/3155"}],"replies":[{"embeddable":true,"href":"https:\/\/www.een.com\/sv\/wp-json\/wp\/v2\/comments?post=141455"}],"version-history":[{"count":0,"href":"https:\/\/www.een.com\/sv\/wp-json\/wp\/v2\/posts\/141455\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.een.com\/sv\/wp-json\/wp\/v2\/media\/13407"}],"wp:attachment":[{"href":"https:\/\/www.een.com\/sv\/wp-json\/wp\/v2\/media?parent=141455"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.een.com\/sv\/wp-json\/wp\/v2\/categories?post=141455"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.een.com\/sv\/wp-json\/wp\/v2\/tags?post=141455"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}