Your Source for Security Cameras & Other Security Equipment

Security Tips

Online Security

Because of the convenience of the internet and our connected devices, more of us are turning to mobile apps and online solutions to conduct different types of business. However, with this added convenience comes greater risk. These security measures will help to keep your personal information safe.

Passwords
First and foremost, to keep your passwords safe, keep them to yourself. Another way to protect your accounts is to choose a password that is not easy to guess. Ideally, passwords should be at least 16 characters and comprised of a combination of numbers, symbols, uppercase letters, lowercase letters, and spaces. You will also want to avoid any repetition, dictionary words, usernames, pronouns, IDs, and any other default number or letter sequences.

Bruce Scheier, a computer security expert, suggests taking a personally memorable sentence and modifying it into a password. For example, the sentence “When I was 11, my sister made me fight the neighborhood bully” can be transformed into “Wiw11msmmFtnbully” (it should go without saying not to use this as a password). Instead, use this as a guide to create your own, unique password.

Also, using the same password for multiple accounts is a bad idea. Try to come up with a different password for each account. Worried you’ll have so many passwords that you’ll get them mixed up? Consider using a password manager to keep track of your different accounts and login information.

Email
Despite the abundance of social media and text messaging to keep people connected, email is still frequently used. And, unfortunately, it is still susceptible to hackers. Spam and malicious attachments can be rather damaging, yet we still click on things we shouldn’t. If something looks fishy, or is unfamiliar to you, do NOT click on it or open it. If it comes from someone you know, but you weren’t expecting it, confirm with the sender before taking action.

Online Shopping
The convenience of shopping from the comfort of your own couch or bed has its perks, but it also has its downfalls. When you use your credit card to shop online, there is a risk of your information being stolen. This shouldn’t deter you from shopping online, however, you should be cautious about when and where you use your credit card.

First, you should only use your credit card on websites with the prefix “https”. The “s” indicates that the site is using a secure protocol to encrypt communications between you and the website. If it is missing, you may want to proceed with caution. You will often see the “https” prefix when you are looking at sensitive information on online banking sites.

Also, avoid sending your credit card details on unsecured websites, via email or on any social media sites (even in private messages). Do not give more information than necessary, such as your date of birth or social security number. If you have never purchased from a vendor before, you should double check the physical address and contact information before completing your order. It is advised that you do not do your online shopping on public Wi-Fi or public computers, and it’s best to use a payment method with buyer protection. Lastly, always log out after ordering.

Account Protection
When you log in to a site with a username and password, this is known as single-factor authorization. While this method is secure on its own, two-factor authorization boosts security. With two-factor authorization, after entering a username and password, you are also asked to provide another security credential, such as a fingerprint or unique pattern. While a person can gain access to your basic login information, they would not be able to pass without the second unique security credential, safeguarding your account information.

Mobile Device
When it comes to your smartphone, it seems like a no brainer that you should set a screen lock code. That way, if your phone is lost or stolen, a stranger cannot instantly access all of your smartphone’s contents. For iPhones, you will want to set a 6 digit passcode – the added digits make it harder for someone to guess.

Aside from a screen lock code, you should disable any tracking options, whether it is tracking your location or the websites you visit for advertisement purposes, and prevent apps from uploading your information. You may want to block your phone number as well, since some companies may collect it and any information attached to it and use it for profit. Along the same lines, avoid answering spam calls as this may confirm that the number reaches an actual person and your number may be sold to other companies, thus increasing the number of spam calls and texts you may receive.

Use a recovery app in case of emergencies. Whether you simply misplaced your phone, forgot it in a public place, or someone stole it from you, recovery apps are designed for you to track the location of your phone and even lock or wipe your phone as necessary. If a Good Samaritan happens to stumble upon your lost phone, you may want to provide owner contact information, but keep it minimal. Stick to a first name and last initial, and a phone number of a friend or family member to contact if lost.

The best defense against losing or having your smartphone stolen is to keep it close to you. Store it in a tight, front pocket, or in a deep pocket of a big bag.

When there’s a will, there’s a way, and if a hacker is determined on getting his hands on your information, he just might. However, employing these security tactics helps you maintain control and makes it harder for hackers to reach that goal.

Have any other security tips you would like to share? Connect with us on Facebook, Google+, Twitter, LinkedIn, and Pinterest.

For great security cameras, surveillance packages, and more, visit SecurityCamExpert.com. Call 1-888-203-6294 to inquire about our free CCTV system quote and installation services.

Surveillance Video Analytics

Despite how it may be depicted on television or movie screens, reviewing surveillance footage to find evidence is a lengthy process. Sifting through hours, sometimes days, of footage is costly, time consuming, and, when done by humans, is rarely effective. Luckily, advanced technologies can save the day.

Originally, CCTV video footage was used to monitor retail stores or businesses to prevent theft, damage, or employee misconduct, and provide evidence if something were to happen. If nothing occurred, the storage would be overwritten because space was limited and the footage proved useless.

These days, storage capacity has increased and new data processing techniques make this footage extremely useful. The accessibility of recording devices with advanced features is changing the value of videos. And thanks to machine learning and video analytics, surveillance footage can be sorted and evaluated in a timely manner.

Video Analytics
Rather than wasting time and resources having humans evaluate footage, video analytics can take care of it. Video analytics is the process of extracting pertinent information from video footage. It basically works like image analytics, but goes a step further.

Image analytics can look at a still image to find patterns, anomalies, and identify faces. Video analytics can do the same, plus measure and track behaviors. Because of this, video analytics has a promising future within different industries.

The Use Of Video Analytics
Because this technology is great for identification, behavior analysis, and situational awareness, various businesses and industries can benefit greatly. Video analytics allows business owners to evaluate who visits their stores, identify peak hours, analyze customer behavior, and more. This gives businesses insight into how they can improve customer service and which deals or displays attract more customers. These types of insights can also benefit the marketing departments, as they can better understand customer demographic and tailor ads to those groups.

Video analytics can even be applied for security and law enforcement. Since body cameras for police are becoming widely adopted, these produce lots of video footage. Video analytics could make the recordings useful by adding rich tagging and indexing, making it easier to search through footage. Parsing through certain time periods and identifying persons with specific characteristics can help to develop leads and even recognize and predict different patterns.

For airports, stadiums and other major event and transportation venues, video analytics can evaluate footage and help to relieve congestion and lines. By monitoring these venues, more workers can be deployed to decrease wait times and improve customer service.

Video-Based Predictive Analytics
While still in the early stages, a new algorithm, as reported by MIT, allows a computer to predict human actions and interactions based on behaviors seconds before the action. The outlook for this algorithm is promising. As it develops, computers could eventually be taught to predict when a crime or injury may take place.

And as artificial intelligence (AI) and robotics become more feasible in our everyday lives, this type of machine learning and predictive analytics will be necessary for robots to interact with humans naturally.

An excellent example of these video analytics in action is Veenome for marketing. Its YouTube analytics tool helps advertisers choose which videos are better suited for them to display ads. Another example is Prozone for sports analytics. By analyzing video footage of the field, players’ stats can be recorded and more effective plays can be planned and executed.

These video-based predictive analytics can also help with decision-making in industries such as aviation, air traffic control, ship navigation, power plant operation, and emergency services. Accidents and crimes can be prevented, thus, potentially saving lives.

Video Gray Area
Of course, as it goes with all surveillance, privacy concerns arise. Currently, analytics where data collection does not require consent is still a gray area. Until laws are in place to protect the public as well as businesses, companies should consider employing video analytics ethically, with respect and privacy to the data and its consumers alike.

Want to share your thoughts on video analytics and its application in the real world? Connect with us on Facebook, Google+, Twitter, LinkedIn, and Pinterest.

To find an excellent array of quality security cameras and surveillance equipment at affordable prices, please visit SecurityCamExpert.com. If you have any questions or want to learn more about our services and equipment, please call 1-888-203-6294.

IP Video Surveillance For Your Business

Video surveillance can be an invaluable asset for businesses. It helps to improve security, manage risks, and boost efficiency. Most benefits of video surveillance can be seen and measure, however, determining its financial return isn’t as easy.

In order to better understand the fiscal value of IP video surveillance, security leaders consider the impact and effect of a hypothetical security event. This gives them better insight to how effective their surveillance system is. And by understanding how IP video surveillance adds value to your business, you demonstrate your overall dedication to success. Here are some of the ways IP video surveillance can influence and improve your business.

Protection
A common reason to employ IP video surveillance is to protect your property, employees, and customers. It can help to minimizes losses when it comes to a security incident, however, it can go further. The application of IP video surveillance can also ensure cyber security, data protection, intellectual property and brand reputation. By protecting these assets, a cohesive approach to risk management can be achieved.

Various Applications
Again, video surveillance goes beyond security and safety. It has become a fundamental aspect when building a business. Aside from monitoring on-site and remote locations, surveillance footage can be analyzed to improve employee productivity and help to measure the success of marketing campaigns. This data can be valuable across different departments, which adds to its value and merit.

Demonstrate ROI
There are different ways you can evaluate and determine the total cost of ownership for your system. For example, by investigating liability claims with video footage, you can save money and prevent future slip-and-fall claims. Some cases may be proven false, while others may bring to light new or unnoticed safety risks that can be addressed.

The stronger your system is, the more money you can potentially save. The most effective systems are comprised of enough cameras to cover all areas and detect crimes in progress, with highly trained staff to monitor the different feeds. A system that can do this as well as integrate the technology into all manner of law enforcement activities will demonstrate true ROI to security leaders.

Remote Monitoring
Remote monitoring is an excellent luxury of IP video surveillance. When alarms go off or unfamiliar activity is detected, rather than sending managers or guards to investigate, you are provided with alerts and can respond quickly and appropriately.

Building a system that meets these standards will be a great addition to your business. What other benefits do you enjoy with your video surveillance system? If you don’t have one now, are you considering implementing an IP video surveillance system for your business? Share with us on Facebook, Google+, Twitter, LinkedIn, and Pinterest.

We carry a great selection of IP video surveillance cameras, equipment, packages, and more. Visit SecurityCamExpert.com to browse our inventory or call 1-888-203-6294 to speak with a representative.

Prevent Burglaries

People often take vacations over the summer, which makes it no surprise that July and August are the months with most break-ins. If you’re going away for a little vacation, use these tips to help keep your home and property safe.

Think Like A Burglar
Take a look at your home and think about the ways you would try to break in. These spots should be reinforced with extra security. You may also want to consider concealing your valuables. If burglars can see something they want through a window, they may be more likely to target that home.

Take Inventory
Take pictures of your home and your belongings before you leave. In case a burglar does target your house, the photos can help to document any damage and help you create an inventory log with estimated values of your items. Both of these can be especially helpful for insurance purposes.

Secure Indoors
These will need to be adjusted if you have a house sitter or pet sitter coming and going, but, in general, you should:

  • Update your security cameras or ensure they are working properly before your trip. If your system allows remote access, be sure that you have the proper device, application, and/or log in information to do so.
  • Store your valuables in a safety deposit box.
  • Lock all windows and close most of the shades.
  • Use a timer for your lights to make it appear as if someone is still home.
  • Set your alarm and security system before you leave.

To avoid returning to damaged property, turn off and unplug electronics, such as TVs, computers, or other devices, that could be damaged in the event of power surges. Depending on the length of your vacation, you may want to consider turning off the water and gas as well.

Secure Outdoors

  • Don’t leave hidden spare keys outside of your home.
  • Park your car inside your garage.
  • Mow the lawn and trim the hedges.
  • Move ladders or any other supplies that burglars could use to get to the second story.

Neighborly Love
If possible, get your neighbors involved. Choose a trusted neighbor or two and politely ask them if they can keep an eye on things while you’re away, and offer to do that same if they leave. You can have the post office hold your mail, or have your neighbors pick it up, as well as any ads or flyers left on your door. You may also ask them to mow your lawn, trim plants, and set out trash cans, even if they are empty. This will help to keep up the charade that someone is occupying the home. Lastly, consider giving your most trusted a neighbor a spare key in case of emergencies.

Do you have any other tips to share? Find us on Facebook, Google+, Twitter, LinkedIn, and Pinterest.

If you’re looking to upgrade or add a surveillance system to your home or business, please visit SecurityCamExpert.com. We carry a vast selection of quality security cameras, CCTV surveillance packages, and more at affordable prices. To schedule a free site survey or learn more about our installation services, please call 1-888-203-6294.

Protect Your Surveillance System

Installing a surveillance system in your home or business can provide you with a sense of security. However, if you do not properly secure your system, cyber criminals can gain access to your video feeds.

Aside from an unnerving invasion of privacy, unauthorized access to your surveillance video can help criminals study the area, identify where important property is located, figure out traffic patterns, sabotage systems, deny access to feeds, and much more.

Because IP security camera systems connect to LAN networks, extra precautions are necessary to safeguard your system from attacks. Breaches are usually due to human error, negligence, and misconfigurations, and can often be prevented. The following are common vulnerabilities and ways to protect your surveillance system.

Weak Passwords
Default usernames and passwords are common with most IP based security cameras. They are used to set up your system and accounts for remote access. Too often, people fail to change these passwords, or choose simple passwords, making it easy for strangers to access feeds.

Be sure to set strong passwords, use good password management or user certificates in lieu of passwords. You may want to consider changing your password periodically as well.

Poor Deployment
Avoid enabling unused services as it can leave your system vulnerable to attacks. For example, cyber criminals could install malicious applications and scripts using file transfer protocol (FTP) or an app platform from an untrusted developer.

Minimize your risk by disabling any unused services and installing only trusted apps.

Unclear Roles
Sometimes organizations fail to define who has access to different aspects of the surveillance system, possibly leading to confusion and employees with unnecessary access. For example, it may be unclear as to who is responsible for reviewing security measures to ensure proper protocol is being followed.

For IT departments, it is recommended to only allow users access to the resources they need to perform their job.

Software Bugs
Bugs and flaws in software codes can put your devices at risk. Luckily, you can do your part to prevent this.

Always keep your cameras, equipment, and software up-to-date with the latest firmware to ensure that bugs will not pose a threat. Vendors often post public common vulnerabilities and exposure reports which provide solutions for users.

Physical Installation Problems
Whether it is your cameras, wiring, or other infrastructure, poor installation can leave your system at risk.

Cameras should be installed out of reach to avoid any possible tampering or vandalism, but at a proper angle to view people and objects clearly.

Poor Physical Protection Of Equipment (Cabling, Servers, Gear)
If your cabling, server, or other surveillance equipment is not properly protected, your system is at risk for poor, intermittent performance. A small kink or damage to a cable can interfere with signal, causing disruption in your feed or even power failure.

Appropriate housing to protect your equipment from severe weather or extreme heat is available and is recommended for use if you are in an area susceptible to these conditions.

Poor Maintenance
Routine maintenance is ever important to ensure that your system is and will continue to function properly.

A preventative maintenance program should include a checklist of issues to look for in order to avoid small issues that can turn into big problems (ex. damaged/loose cameras and equipment, exposed, loose, or damaged cabling, dirt/moisture on camera lenses). This will allow the owner to become accustomed to the system and more aware when something seems different or wrong (ex. possible signs of tampering).

Flaws In Standard Network Protocols
Most network surveillance systems use standard network protocols (ex. FTP, TCP/IP), however, weaknesses or flaws in these protocols can expose surveillance data to attacks.

For video streams sent over the network, the latest advanced encryption methods should be used.

Failure To Align Hardware/Software On The Network With IT Policy
If your hardware or software does not meet your IT organization’s network security policy, there will be security issues. For example, third-party software or apps are often poorly supported or lack security patches which make them vulnerable to security breaches. Thus, your IT department will not be happy.

Enforcing a strong IT policy is imperative for any business.

How do you protect your surveillance system from cyber and physical attacks? Share your best tips with your peers on Facebook, Google+, Twitter, LinkedIn, and Pinterest!

Find a great selection of security cameras including IP surveillance cameras, CCTV security camera packages, and more at SecurityCamExpert.com. For more information, please call 1-888-203-6294.

Security Cameras: What You Need To Know

Security cameras are a great way to keep an eye on your property or business. You can use them to look after your loved ones, protect your inventory, or deter intruders all together. As appealing as security camera systems are, it is wise to know and understand your local surveillance laws.

Before you invest in your own security cameras, please review these general guidelines. Remember, these are not meant to apply to your specific situation. Instead, they are meant to give you a general idea of what is and is not allowed. If you have any further questions regarding filming restrictions and such, please contact a local attorney or research laws within your city and state.

Filming
Camera placement is important because you want to capture high traffic areas, such as entrances and back doors. If you direct your camera at an insignificant area, you will waste time and money while defeating the purpose of your security system.

Placement is also important because there are areas that are off limits, including restrooms, other people’s homes, dressing rooms and locker rooms. Basically anywhere that there is an expectation of privacy, or you are likely to be in a state of undress, is off limits.

If you are unsure whether or not you are violating someone’s right to privacy, err on the side of caution and always consult a lawyer.

Loopholes

  • Private Rooms

If you own a retail business, you may worry that customers might be committing crimes in blind spots such as dressing rooms, locker rooms, or restrooms. While legally you cannot monitor these areas, you can monitor the entrances/exits. Be sure that when the door opens, your camera does not get any glimpse of what’s behind that door, otherwise you could get into trouble. If a person goes into a restroom or dressing room with some inventory, and then exits without it that is a suggestion of a crime.

  • Neighbors

Areas that are viewable to the public are generally legal to film. This is how Google is able to provide the 360-degree street view for Google Maps. However, it is ill-advised to point your security cameras at your neighbor’s home. Whatever situation that warranted your desire or need to film your neighbor’s home could become escalated. Whether you are the one filming or the one being filmed, you may want to first speak with your neighbor about camera placement.

Audio
With audio recording, Federal Law only requires one person to know about the recording taking place. State laws will provide different regulations. Remember that federal law creates a baseline for laws. That is, state laws cannot allow for any less than one informed party.

Audio is not allowed to be obtained through eavesdropping or remote recording. Because at least one of the parties must know of the recording, you are not permitted to record conversations you are not a part of since you do not count as one of the parties. Even if the conversation is taking place in a public area, the parties can still expect privacy which protects them from eavesdroppers. In the same vein, you cannot leave your unattended recorder somewhere and use the recordings as evidence.

Loopholes
The easiest way to get around audio recording rules is to make the party aware that they are being recorded. For example, often times when you call a customer service line, you will likely hear, “This call may be recorded…” Continuing the conversation after this notification is usually viewed as consent. Thus, once you have informed someone that a room is being monitored by audio surveillance, they have the choice to continue their conversation in that room or move the discussion to a different room.

You may also record a person so long as you don’t intend on using the recording for illegal acts. Because one party is aware of the recording, the act of recording is not illegal. However, if your recording contains private information that is covered by the common law privacy, you may get into some hot water. The private information could be things like medical history (ex. miscarriage, abortion) so be sure to understand what is and is not covered.

The Constitution & Surveillance
The Fourth Amendment protects citizens from “…unreasonable searches and seizures…” and details the rights of privacy. While you may think that some public security cameras would count as unreasonable, the case of Delaware v. Prouse will tell you otherwise. In this case, the Supreme Court stated that “people are not shorn of all Fourth Amendment protection when they step from their homes onto the public sidewalks”.

As far as the First Amendment goes, there has not been any critique on a camera’s existence suppressing behavior. In fact, in the Laird v. Tatum case, the court found that government surveillance of anti-war protesters did not hinder their freedom of expression. This can help security camera owners when there are accusations of civil liberty violations.

Recording Police
The First Amendment also gives you the right to document civil servants as they are performing their civic duties. The recordings are simply viewed as a way of exercising your rights. Officers may ask you to stop recording and ask for the evidence, however, you do not have to submit to their requests unless they have a warrant for your property.

The only instance in which you may be violating the law is if you are interfering with an investigation. This is often used to remove reporters from a crime scene, but your personal security camera should not interfere with the investigation. In fact, your video surveillance may be of use for the investigation.

Dual Consent
If you ever wondered why most security cameras do not have microphones, it is because, in some cases, you may need dual consent to record audio. Violating dual consent is a felony. Your best bet is to get consent to be taped before recording, and then again as the first order of business when the recording begins. Off tape and on record consent will cover your bases if you are sued for violating wiretap laws. And although it is deemed “dual consent”, you must get the express consent of everyone being recorded.

The following states may have variations on the law and should be further researched: California, Connecticut, Florida, Hawaii, Illinois, Maryland, Massachusetts, Nevada, New Hampshire, Pennsylvania, and Washington.

Recording Employees
The employer must have a legitimate reason for recording. The off limits areas include restrooms, locker rooms, and dressing rooms. There may also be restrictions in the break room. Again, you cannot record any place in which a person should expect privacy. However, anywhere that an employee interacts with a customer can be monitored. For example, the sales floor is fair game, but a personal office may not be. You will need to use your best judgment or consult an attorney. Disclosing the use of surveillance equipment to your workers will cover your bases for any illegal wiretapping issues.

The biggest restriction for recording employees is in regards to unions. An employer may not record union activities such as meetings or even discussions about union business. And surveillance cannot be used to intimidate current or prospective members of the union.

Evidence for Trial
When you submit any type of recording to a court of law, the evidence is put on trial. The validity and handling of this evidence is then scrutinized. You, as the recorder, must prove that the evidence was in no way doctored. You must go through the steps of how the footage was obtained (ex. how the video was recorded, where the camera was located, the quality of the camera at different times of day, how it was stored, etc.), and verify the whereabouts of the evidence as it was transported to court. When the footage is not in court, it must be securely stored. The integrity of your recording may be compromised if there is any data loss due to a power surge or data dump.

With this information, you should be able to make informed decisions when it comes to your security camera system. If you have any tips to share, please connect with us on Facebook, Google+, Twitter, LinkedIn, and Pinterest.

For a great selection of quality security cameras, full CCTV surveillance packages, and more, please visit us online at SecurityCamExpert.com. To learn more about our installation and services, or to schedule a site survey, please call 1-888-203-6294.

Smart Home Protection

Smart home technology offers more than just convenience for simple tasks. These smart devices can help safeguard your home and loved ones from the hidden dangers of your home. These are just some of the many ways you can use smart home technology to protect your property.

Water Damage
Do you live in an area prone to floods? Or do you simply want to know when there might be a water leak? Invest in a flood sensor, which can help you detect leaks or floods before it’s too late. Some sensors come with a smart valve shut off, which could automatically save your property from damage.

Protect Your Children
Aside from flood sensors, there are motion sensors that you can install as well. While these can alert you when a door or window is opened, you can also install them on different things around the house. Keep your kids out of the liquor or medicine cabinets, and even knife drawer if you choose. This can keep your mind at ease when your kids are home alone.

Deter Intruders
Most burglars will target empty homes since there is less chance of getting caught. So how do you prevent your home from becoming a target when you’re away? Invest in smart appliances that can make it appear as if you are home. These allow you to program lights to turn on and off in the evening. Some devices can even record your light patterns and play them back when you’re away.

Of course, you can always inform a trusted neighbor of your upcoming vacation and politely ask them to pick up the mail and keep an eye on things while you’re away. But investing in home security devices and systems couldn’t hurt.

Do you use any smart home devices? How have they helped you? Share with us on Facebook, Google+, Twitter, and now, LinkedIn. You can also find us on Vine and Pinterest.

Visit SecurityCamExpert.com for an excellent selection of CCTV surveillance cameras, security camera systems, recorders, and more. Call 1-888-203-6294 for more information about our products, site surveys, and installation services.

Security Flaws Of Smart Home Systems

Smart homes allow you to connect different aspects of your home, including things like appliances, alarms, and sensors. Most find this concept alluring since you can control your appliances and home security remotely, allowing you peace of mind whether you are at home or away.

With the convenience provided by these smart home systems comes considerable risk. Some devices, while acting as a helpful tool, could end up hurting you if access to your system fell into the wrong hands.

In hopes to identify potential security risks and call attention to producers of smart home systems and devices, a team made up of Earlence Fernandes, Jaeyeon Jung, and Atul Prakash joined forces to look at different systems. The systems under study were those that were larger and more popular with consumers. They looked at common features, how devices interacted with each other, which third-party apps were supported, and most importantly, security features, among other aspects.

From this study, two major flaws were found:

Privileges
Akin to your smartphone asking for permission to access certain things on your phone, certain smart home devices and apps can access different functions with your permission. The problem therein lies in how these functions are grouped together.

For example, if an app can automatically lock a door after 9pm, it likely has the privilege to unlock it, although that function is not necessary. The app developer cannot ask for permission to lock a door without the ability to unlock it.

Most apps have access to more functions than they need, putting your security at risk.

Messaging
Because devices and apps can communicate through messaging (think instant messenger), sensitive data sent through this system can be vulnerable. For example, a door lock’s PIN code may be sent in a message. Since these messages are not entirely secure, any software that has the most basic access to your device can receive all the messages that the device generates or receives.

Other apps can also “impersonate” smart home equipment, in that, they can send messages that look like messages sent from real smart home devices. The phony app could possibly read and steal the network’s ID and then create a message.

Testing The Flaws
The team of researchers then created four different attacks to show how attackers could use the aforementioned flaws to their advantage.

For the first attack, they created an app that’s purpose was to simply monitor battery levels of various wireless devices around the home. However, after a user downloads the app, it can be reprogrammed to monitor other messages sent by those devices.

In the second attack, they were able to listen to the supposedly secure messages between an app and its companion mobile device. The team was able to impersonate the mobile device and send commands to the app, such as creating a new PIN which would give an attacker access to your home.

The third and fourth attacks involved disabling and enabling different functions. For example, a custom app could disable “vacation mode,” which allows the system to turn lights on and off to make the home seem as if it is occupied. Another app was able to falsely trigger a fire alarm by acting as a carbon monoxide monitor.

Security Improvements
Just because smart home systems currently have security flaws does not mean these systems and the Internet of Things do not have great potential. As of now, if you are considering adopting a smart home system, much like anything else, proceed with caution. You might want to think twice about giving third party apps access to your devices, and do some research on the security of the system you choose.

As security and technology improves with these systems, the Internet of Things and smart home systems will likely see much wider adoption. This could eventually lead to better quality of living.

Have you considered adopting a smart home system now or in the future? Do you currently employ any smart home devices? Share your thoughts and experiences with us on Facebook, Google+, Twitter, or Pinterest.

For an excellent selection of security cameras, CCTV surveillance packages, security equipment, and more, please visit SecurityCamExpert.com. If you have any questions, please call 1-888-203-6294.

Secure Your Wireless Surveillance Cameras

Wireless surveillance cameras are also known as IP (Internet Protocol) cameras. Aside from securing your property inside and out, they are also often used as baby monitors. When used as baby monitors, wireless IP security cameras are often equipped to pick up audio as well as video.

With these cameras, video footage is streamed to a secure online space and you may view what is happening on a computer or via a mobile app or device. To ensure the security of your live feed, these cameras should offer encryption for your streamed data along with a username and password protected hub or app for viewing your footage.

Does your system or equipment lack any of these? Do you want added security for your wireless surveillance cameras? Follow these tips to ensure the most secure experience.

Network Security
Aside from securing your devices, the wireless network you connect to should also be secure. If you are using your home network, make sure your router is configured to use WPA2-based encryption. This will cover the connection between your cameras and router, while the stream’s encryption handles the rest.

You will want to steer clear of viewing your feed over open wireless networks. If you enter any usernames or passwords over these networks, they could potentially be “sniffed,” leaving you vulnerable. While these can be helpful when it comes to decreasing your mobile Internet charges, connecting to these open networks should not be done without the assistance of a VPN (Virtual Private Network).

Online Streaming
Having your camera stream footage online 24/7 can be helpful, but it also leaves you more susceptible to privacy risks. Your ISP may be hesitant to support your excessive bandwidth needs for your IP security cameras, and any bugs in your system could threaten the security of your feed.

Online streaming should only be done when you are certain the stream is secure. For the remainder of the time, maintaining a closed and secure network for your IP cameras on a secure network should suffice.

Password Protection
Cameras usually have the ability to be password protected, but you must manually enable it. Once this feature is enabled, you MUST change the defaults. Since the default usernames and passwords for most cameras are easily to find, this is the easiest way hackers will be able to access your feed.

Aside from ensuring that your cameras are password protected, you should be sure that any device you use to access your feed is password protected as well.  For example, if you access your feed from your mobile device, and somehow it gets lost or stolen, someone may have unauthorized access to your feed, as well as other personal information stored on your device.

Positioning
With all this being said, the location and positioning of your cameras play an important role as well. In the worst case scenario, your feed gets broadcast to the public internet. Be sure that you position your cameras in areas in and around your property that you wouldn’t mind strangers seeing. For example, if you must install a camera in your bedroom, avoid pointing it at your bed or any area where you usually change.

Webcams
You may also be worried about your webcams now, too. While threats may arise from time to time, there are ways to keep your webcam secure, such as disabling Flash, updating firmware, and using firewalls.

If you built a custom IP security camera using webcams, hacking threats should be minimal. You have likely used dedicated, reputable software and taken the time to properly configure and secure your system with a username and password.

Maintain Security
To make sure that you keep your devices secure in the future as well, make sure that you keep any and all devices related to or connected to your system up to date. This includes your camera’s firmware, client software on your PC or mobile device, and more. These updates often contain patches for any new threats, and without the proper update, your system could be left vulnerable to an attack.

How do you secure your surveillance system? Do you have any tips to share with us and your peers? Connect with us on Facebook, Google+, Twitter, and Pinterest.

For a great selection of IP security cameras, CCTV surveillance packages, and more, visit SecurityCamExpert.com. To speak with a representative about our products and services, please call 1-888-203-6294.

Choosing A Business Security System

Often times, businesses don’t realize the importance of security camera systems until it’s too late. Rather than installing them prior to opening, they tend to invest in them after a burglary or incident occurs. This may happen because businesses believe that they cannot afford it, or they think the task is too overwhelming and complicated. Luckily, we’ve got some tips and tricks to help you choose the best security camera system for your business.

Before you shop, it would benefit you to really take some time to evaluate what you want and need when it comes to a security system.

  • Choose equipment that is appropriate for your space
    Your environment will likely dictate the type of security system you need. For example, if you are renting your space, you will likely need to avoid equipment that interferes with walls and the structure of the building. Workplaces or offices with more rooms versus open spaces may require more cameras.
  • Understand your goals and your contract
    Aside from your workspace, you will want to know the supposed trajectory of your business. If your plan is to grow or even relocate, be sure that your contract with a security provider allows for add-ons, moves, or even change your plans. If you want to maintain your small business, a smaller, simple security system should suffice. And always remember to read before you sign.
  • How many cameras?
    Next, figure out how many cameras you will really need. You can determine which areas need to be monitored on your own, paying attention to high traffic areas or areas that house important equipment and supplies. Or you can consult with a professional to determine how many cameras you will need for your security system.
  • Camera Types
    Aside from how many you need, you should understand the different types of cameras and features that are available to you. Do you need something discreet or a more flexible camera type? Bullet and dome cameras can be relatively inconspicuous while PTZ (Pan/Tilt/Zoom) cameras allow better range for wide, open spaces. Features are important, too, especially if you need around-the-clock surveillance. Choosing a camera with night vision/infrared LED lights will allow you to view overnight footage, while motion sensors can aid in saving power and storage by only recording when triggered.
  • Additional sensors
    You can secure your property further by installing additional sensors such as smoke alarms, carbon monoxide sensors and flooding sensors. These are optional, but can help to keep yourself and your staff safe so they are worth considering.
  • Alerts
    Setting up alerts can help enhance your security system by notifying you when unusual activity is detected. For example, you can set up alerts for when activity is detected when your store is closed and empty. These types of alerts may not be necessary if you have a cleaning crew or employees who work after hours. Decide which alerts would best benefit your company, and who will receive these alerts.
  • Mobile features
    These days, the ability to access various things from your mobile phone is a must, and your security system is no exception. If you feel so inclined, choose a system that offers remote monitoring and access to your account.
  • Reputation and quality
    Before committing to a security system and/or professional installer, you should do some research, read reviews, or even ask for references. You want to be sure that you will get the services and quality that you deserve.

For information on our CCTV security and surveillance equipment, site surveys, and installation services, please call 1-888-203-6294 or visit us online at SecurityCamExpert.com. Connect with us on Facebook, Google+, Twitter, and Pinterest, too!

Recent Comments