Security Sales & Integration April 2021 - 43

with a default password. Most vendors have
removed those default passwords because end
users were not changing the default password
and their cameras were getting hacked.
Here's a little secret: Criminal hackers love default settings. They search for default passwords,
default ports and default settings. Then, they focus attacks on all those default settings because
they know that many people will not change from
the default. Eventually vendors learned to make
changes to better protect their customers, like
forcing end users to create a password when they
set up their device. While this is positive progress,
it is much better to be proactive than reactive.
We know how to secure a computer, now
we need to adopt those standards and requirements for IoT devices.

Early Stages: Where We Are Today
As recently as 2017, observing physical security
from the computing world it was readily apparent that the former had not adopted some
of the basic cybersecurity controls used by the
latter. However, there was a lot of talk about
cybersecurity in the industry because just a year
earlier, thousands of IP video cameras, NVRs
and home routers all over the world were used
as part of an Internet weapon, the Mirai botnet.
The Mirai botnet was used in a number of
Distributed Denial of Service (DDoS) attacks
that took down or slowed down large portions
of the Internet, including Twitter, Netflix, Spotify, Airbnb, Reddit, Etsy, SoundCloud and The
New York Times.
Since then, cybersecurity has become not
only a talking point in the security industry,
but also a concern. End users are rightly concerned that a vulnerable camera or NVR will be
the vector by which an attacker breaches their
network. This is a valid concern, but they need
to realize that their cameras, recorders and all of
their IoT devices are computers and technically,
they are likely all Linux web servers.
The good news is that simple network segmentation can greatly reduce the risk of an IoT
device being the entryway for an attacker to
gain access to sensitive systems and data. So,
what role do the different parties play in the
securing a device? Who's responsible for what?
First, manufacturers need to build security
into their products; that's a given. But manufacturers can only do so much when it comes to
securing a device. If the end user places a camera directly on the Internet, that device will be
securitysales.com  	

SS2104 pp42-44 Standards CyberSecurity.indd 43

attacked. If the device has a weak password or
unpatched vulnerabilities, that device will not
only be attacked, it will likely be compromised.
The bottom line is this: Everyone has responsibility when it comes to cybersecurity and the
challenge is making sure that everyone knows
what their role is in securing a device.

Baking in Cybersecurity
Vendors need to build cybersecurity into products, dealers and integrators need to install devices
in a secure manner and advise end users on how
to securely manage their devices, and end users
need to maintain the device and patch it when
needed. If everyone knows and executes their
roles, the threat of cyberattack is greatly reduced.
Vendors compete against each other in the
marketplace but the only way to defend against
a common threat, like cyber-attackers, is to
work together. The good news is that organizations like the Security Industry Association
(SIA) have created working groups such as its
Cybersecurity Advisory Board, to bring together industry experts, vendors and stakeholders,
to discuss and solve the challenges of securing
the products sold in the security industry.
Another example of vendors working together
is the 2019 efforts coming from the U.K.'s Sur-

Everyone has responsibility when it comes
to cybersecurity and the challenge is making
sure that everyone knows what their role is in
securing a device.
veillance Camera Commissioner, who coordinated video camera vendors to work together to
create the Secure by Default program for video
surveillance cameras. This groundbreaking work
established a set of basic cybersecurity standards
for vendors to support in their products. While
the first iteration of this program addressed some
of the more basic cybersecurity controls, the plan
was to add more controls over time. This allows
the vendors to bake security into their products
instead of trying to bolt them on all at once.

Some Progress in Washington
Fortunately, there are reasons to be optimistic
about progress in cybersecurity in the IoT space.
In December H.R. 1668: The IoT Cybersecurity Improvement Act of 2020 became law. This
APRIL 2021 Security Sales & Integration	

43

3/22/21 10:31 AM


http://www.securitysales.com

Security Sales & Integration April 2021

Table of Contents for the Digital Edition of Security Sales & Integration April 2021

Security Sales & Integration April 2021 - Bellyband1
Security Sales & Integration April 2021 - Bellyband2
Security Sales & Integration April 2021 - Cover1
Security Sales & Integration April 2021 - Cover2
Security Sales & Integration April 2021 - 1
Security Sales & Integration April 2021 - 2
Security Sales & Integration April 2021 - 3
Security Sales & Integration April 2021 - 4
Security Sales & Integration April 2021 - 5
Security Sales & Integration April 2021 - 6
Security Sales & Integration April 2021 - 7
Security Sales & Integration April 2021 - 8
Security Sales & Integration April 2021 - 9
Security Sales & Integration April 2021 - 10
Security Sales & Integration April 2021 - 11
Security Sales & Integration April 2021 - 12
Security Sales & Integration April 2021 - 13
Security Sales & Integration April 2021 - 14
Security Sales & Integration April 2021 - 15
Security Sales & Integration April 2021 - 16
Security Sales & Integration April 2021 - 17
Security Sales & Integration April 2021 - 18
Security Sales & Integration April 2021 - 19
Security Sales & Integration April 2021 - 20
Security Sales & Integration April 2021 - 21
Security Sales & Integration April 2021 - 22
Security Sales & Integration April 2021 - 23
Security Sales & Integration April 2021 - 24
Security Sales & Integration April 2021 - 25
Security Sales & Integration April 2021 - 26
Security Sales & Integration April 2021 - 27
Security Sales & Integration April 2021 - 28
Security Sales & Integration April 2021 - 29
Security Sales & Integration April 2021 - 30
Security Sales & Integration April 2021 - 31
Security Sales & Integration April 2021 - 32
Security Sales & Integration April 2021 - 33
Security Sales & Integration April 2021 - 34
Security Sales & Integration April 2021 - 35
Security Sales & Integration April 2021 - 36
Security Sales & Integration April 2021 - 37
Security Sales & Integration April 2021 - 38
Security Sales & Integration April 2021 - 39
Security Sales & Integration April 2021 - 40
Security Sales & Integration April 2021 - 42
Security Sales & Integration April 2021 - 42
Security Sales & Integration April 2021 - 43
Security Sales & Integration April 2021 - 44
Security Sales & Integration April 2021 - 45
Security Sales & Integration April 2021 - 46
Security Sales & Integration April 2021 - 47
Security Sales & Integration April 2021 - 48
Security Sales & Integration April 2021 - 49
Security Sales & Integration April 2021 - 50
Security Sales & Integration April 2021 - 51
Security Sales & Integration April 2021 - 52
Security Sales & Integration April 2021 - 53
Security Sales & Integration April 2021 - 54
Security Sales & Integration April 2021 - 55
Security Sales & Integration April 2021 - 56
Security Sales & Integration April 2021 - 57
Security Sales & Integration April 2021 - 58
Security Sales & Integration April 2021 - 59
Security Sales & Integration April 2021 - 60
Security Sales & Integration April 2021 - 61
Security Sales & Integration April 2021 - 62
Security Sales & Integration April 2021 - 63
Security Sales & Integration April 2021 - 64
Security Sales & Integration April 2021 - Cover3
Security Sales & Integration April 2021 - Cover4
https://www.nxtbook.com/emerald/securitysales/august_2023
https://www.nxtbook.com/emerald/securitysales/july_2023
https://www.nxtbook.com/emerald/securitysales/june_2023
https://www.nxtbook.com/emerald/securitysales/may_2023
https://www.nxtbook.com/emerald/securitysales/april_2023
https://www.nxtbook.com/emerald/securitysales/march_2023
https://www.nxtbook.com/emerald/securitysales/february_2023
https://www.nxtbook.com/emerald/securitysales/january_2023
https://www.nxtbook.com/emerald/securitysales/december_2022
https://www.nxtbook.com/emerald/securitysales/november_2022
https://www.nxtbook.com/emerald/securitysales/october_2022
https://www.nxtbook.com/emerald/securitysales/september_2022
https://www.nxtbook.com/emerald/securitysales/august_2022
https://www.nxtbook.com/emerald/securitysales/july_2022
https://www.nxtbook.com/emerald/securitysales/june_2022
https://www.nxtbook.com/emerald/securitysales/may_2022
https://www.nxtbook.com/emerald/securitysales/april_2022
https://www.nxtbook.com/emerald/securitysales/march_2022
https://www.nxtbook.com/emerald/securitysales/february_2022
https://www.nxtbook.com/emerald/securitysales/january_2022
https://www.nxtbook.com/emerald/securitysales/december_2021
https://www.nxtbook.com/emerald/securitysales/november_2021
https://www.nxtbook.com/emerald/securitysales/october_2021
https://www.nxtbook.com/emerald/securitysales/september_2021
https://www.nxtbook.com/emerald/securitysales/august_2021
https://www.nxtbook.com/emerald/securitysales/july_2021
https://www.nxtbook.com/emerald/securitysales/june_2021
https://www.nxtbook.com/emerald/securitysales/may_2021
https://www.nxtbook.com/emerald/securitysales/apr_2021
https://www.nxtbookmedia.com