Nov 18, 2019
Posted in blog, Featured, Information Security, News, security awareness, social engineering, The Internet Of Things, Uncategorised
National Cybersecurity Awareness Month 2019
So, I ended up posting this much later than I anticipated. I originally had it ready for October. However, I had to make some final edits and had to delay it. None the less, here it is a month later!
Cyber security awareness month is coming up real soon. In
October, it is nationally known as cyber security month. Many security leaders
present important security topics. This is also a time where many companies,
government units and various organizations educate their members on cyber
security. Many hold training workshops, lectures and send out updates to their
workers.
I’d like to highlight some key points that readers should
try to implement and incorporate in their personal lives and at work.
The US Cert organization has built some excellent cyber
security training.
There detailed reports and educational training can be found all for free à https://niccs.us-cert.gov/national-cybersecurity-awareness-month-2019
Read more About This Post
May 22, 2017
Posted in blog, Encryption, Information Security, The Internet Of Things
Network Security for IP Camera’s & Video Surveillance Systems
These days many devices have some form of interaction with our networking devices and the internet itself! What people forget is much like our desktops, laptops and mobile devices. All of these other types of devices need to be secured. The average person is going to assume no security is needed and that the product itself is already fairly secure by default. In my personally opinion, I’d say the default security settings are usually not sufficient enough to keep the device and your network safe.
I’ve created a guide below of procedures that can be followed to enhance the security measures for your IP Camera’s and systems.
IP Camera Hardening Guide
I’ve created a hardening guide below that will look at a few key components that administrators will want to make use of in their network.
- Passwords
- LDAP/AD Authentication
- VLAN’s
- 802.1X Authentication
- Disabling Network Ports
- Disabling Unused Services
- MAC Address Filtering
- Physical Access Control
(more…)