Join or Sign in

Register for your free asmag.com membership or if you are already a member,
sign in using your preferred method below.

To check your latest product inquiries, manage newsletter preference, update personal / company profile, or download member-exclusive reports, log in to your account now!
Login asmag.comMember Registration
https://www.asmag.com/project/resource/index.aspx?aid=17&t=isc-west-2024-news-and-product-updates
INSIGHTS

How to integrate smart home and security cameras without privacy compromise

How to integrate smart home and security cameras without privacy compromise
Generally, the essential part of your network other than the camera itself is your router, as it is a gateway that connects your private network to the public Internet.
There is a quote often used in IoT security that your network is as secure as its weakest link, which applies without any doubt to security cameras, too. Generally, the essential part of your network other than the camera itself is your router, as it is a gateway that connects your private network to the public Internet.
 
"Misconfiguration of the router, especially leaving default username and password and not patching it with latest updates, could be and actually still is the main vector how the hackers can breach into your network," explained Martin Hron, Senior Security Researcher at Avast Software. "There is a feeling that the home network is a completely secure environment because it's isolated from the Internet. However, even one misconfigured device could potentially breach the network. The modern trend in network security is micro-segmentation and perimeter-less security. Which, in its essence, means that you should secure every single device as it is connected directly to the Internet, that means to set a strong password, turn off all services not being used, and keep the device updated."
 
The other option, which is also recommended, is to isolate devices to different networks (segments), so in case of a breach, these could not reach each other. Typically having all security cameras in a separate network than the rest of the IoT and having an extra network for your computers and NAS storage is a recommended setup.

Isolate to protect

Isolation from the rest of the network is an essential step in addressing home security. This is relatively easy to do by setting up guest networks for your IoT home devices. For example, your fridge could still be hacked to make it part of a botnet that sends spam or mines cryptocurrencies.
"However, since it occupies its own network, it won't be able to access your emails or bank account," explains Vitaly Kamluk, Director for Global Research and Analysis Team (GReAT) for APAC at Kaspersky. "Using guest networks can help enhance your home network security in other ways, too."

Also, ensure that the access, control, and delivery devices on your network are secure. That might include smart speakers, your internet router, your computer, and your smartphone. Your smartphone, if hacked or stolen, could compromise your entire home security system, so make securing it your top priority by purchasing Android security or security for iOS devices.

The risk of cloud

As long as the integration works on the cloud, there is a likelihood of privacy compromise. That is why some smart home enthusiasts prefer to build local integration. If the homeowner is an engineer, he can connect two devices using the API by himself or through a third-party private platform.

"Different smart home companies can come into a partnership and integrate their devices before users get them," said Joe Tham, Co-founder of Simshine Intelligent Technology. "One of the missions of our company is to build an on-device AI smart home system on the intranet." 

Antivirus and antimalware solutions

Using a reliable antivirus and antimalware software on your computer as well as mobile devices is also integral to ensuring cybersecurity. Several major companies offer smart home-specific cybersecurity applications these days, along with their complete protection packages, which would go a long way in data protection.
Subscribe to Newsletter
Stay updated with the latest trends and technologies in physical security

Share to: