Product Ranges
CCTV, IP Camera
Contact Us
  • Shenzhen LS Vision Technology Co., Ltd.

  • Country: China
  • City: ShenZhen
  • Address: 6th Floor, Blg 10, A Region, Tang Lang Industrial Park,Li Shui Road, Xili Town, Nanshan District, Shenzhen China
  • Contact Person: LS VISION

CCTV Plays a very important role

The Security camera makes our life better and safety.Especially we face to something dangeours in regular life.

AUSTIN, Texas-(BUSINESS WIRE)-Eagle Eye Networks today announced the availability of its “12 Security Camera System Best Practices for Cyber Protection” white paper. The report covers the major vulnerabilities for security camera system and the twelve corresponding cyber security best practices. The best practices are designated according to whether the system is a true cloud solution, or a traditional DVR, NVR, or VMS systems that is connected to the Internet or corporate network.

“12 Security Camera System Best Practices for Cyber Protection”

With video surveillance, you are typically protecting your employees and company assets. With today’s increasingly internet-connected surveillance systems you need cyber protection or you will expose your company to serious threats, loss of customer data, and loss of company reputation.

“Not only are cyber breaches a major corporate expense, they can destroy the hard-built trust between companies and their customers,” said Dean Drako, President and CEO at Eagle Eye Networks. “Almost 70% of IT is concerned with cyber-security for video surveillance systems. We created these best practices so companies can get a similar level of cyber protection on their video surveillance system as they target with their traditional IT systems.”

This white paper focuses on the best practices for internet-connected security camera systems and cloud-managed video surveillance. Many of these practices also apply to other physical security systems.

The vulnerabilities and cyber-safe best practices for security camera systems covered are:

1,Camera passwords
2,Port forwarding
4,Network topology
5,Operating systems
6,Operating systems passwords
7,Video surveillance system passwords
8,Connection encryption
9,Video encryption
11,Physical access to equipment & storage
12,Video recording software

According above as well known,the security paly a important part on the best practices.
More News