Five dead simple things you should do to improve cybersecurity

-
Five dead simple things you should do to improve cybersecurity

The internet is part of our everyday life now. It is how we pay for groceries, get the news, check the weather, and make sure our kids come home on time or find out if they're at a friend's house. It is also completely integrated into our businesses as the way that we communicate with customers, access our files, and get software updates. With hundreds of daily incoming and outgoing connections that we make via the internet every day, it is imperative that we take precautions to protect our data and our internal networks from hackers and unauthorized access.

Any modern surveillance solution should employ protections to not only prevent unwanted access to its own systems but ensure that it is not a weak link in your secure network. OpenEye Web Services cloud-based user management, role-based user groups, remote software updates, and security policies make it easier to employ best practice security measures and ensure network security.

Whether you are using OpenEye Web Services or a competing solution make sure you are following these five security best practices to secure your recorder and protect your network:

  1. Enable Multifactor Authentication

    Multifactor authentication (MFA) is available on all online accounts where personal and data privacy are at risk. Some accounts require that you use it or you may need to enable it for accounts where MFA is optional. By verifying your identity with a second layer of security you are protecting your business against the leading cause of data breach - compromised credentials. Read more about MFA

  2. Don't use shared account credentials

    Some businesses have accounts where all users use the same login credentials to access software or even their workstation computers. When account credentials are shared there is no way to know which user is accessing the system and when an employee leaves the company their access cannot be revoked.

  3. Change the default username and password

    Network connected hardware comes with a default user name and password to allow you to complete the initial set up and configuration on a new product. If you don't change the default credentials you are making it easy for hackers to access your systems. A default username is a signal to hackers that you aren't taking basic security precautions and you are more likely to be attacked. OpenEye cameras and recorders automatically assign or require users to create a new password at set up.

  4. Check for software updates

    Every day new security threats are discovered and software developers are constantly updating software to protect software and take advantage of new cybersecurity protocols. Check all of the software on your systems regularly to make sure that you have the latest version. Neglecting to install software updates leaves you vulnerable to hackers and inefficient systems.

  5. Set up user permission levels

    Most software has multiple permission levels with admin having the most control. Besides a few people who need to install updates, everyone else can be set up as a user or superuser depending on their access needs and the levels provided by the software. When you create a new user, determine the level of access that they need to fulfill their tasks. If an individual user's credentials are compromised the higher their access level the higher your exposure.

Take a personal guided tour of OWS

Just a few simple steps can greatly improve your cyber security and protect your information and your business systems from hackers. OpenEye Web Services uses MFA as just one of the cybersecurity technologies utilized to shield user data from unwanted access and protect you against data loss or downtime. OWS also employs trusted outbound connections, does not require port forwarding, and does not need any open inbound ports to work, significantly improving the security of your network and surveillance system. Learn more about OpenEye's commitment to cybersecurity and data protection to see how we make your network more secure while lessening the burden on IT and operations.

Article initially published February 7, 2019