Join or Sign in

Register for your free asmag.com membership or if you are already a member,
sign in using your preferred method below.

To check your latest product inquiries, manage newsletter preference, update personal / company profile, or download member-exclusive reports, log in to your account now!
Login asmag.comMember Registration
https://www.asmag.com/project/micron_edge_storage_for_video_security/
INSIGHTS

IP camera hacks: How should users protect themselves?

IP camera hacks: How should users protect themselves?
IP camera hacks, which have become more rampant, have led to calls for better product design. Yet, with security being a two-way street, the user has a role to play as well to better protect themselves.
IP camera hacks, which have become more rampant, have led to calls for better product design. Yet, with security being a two-way street, the user has a role to play as well to better protect themselves.
 
Precautionary measures begin with purchasing the camera. Considering the security of cameras varies across brands and models, the user should do some homework before making a purchase. “Choose a quality product that you have reviewed online and discussed with a cybersecurity expert, if you can. Review security protocols with the supplier and find out if it protects itself. Understand historical alerts and determine if the information would have gotten to you,” said Dave Tyson, SVP of Cyber Security ...


Product Adopted:
Surveillance Cameras
Subscribe to Newsletter
Stay updated with the latest trends and technologies in physical security

Share to: