Product added to cart
LTS Cybersecurity Tips
LTS remains committed to cybersecurity and regularly aids users in avoiding common risks involved. LTS's quality products are backed by highly trained technical support personnel who are proactive in repairing bugs and flaws by providing solutions. As the IoT industry grows and integrates with other technologies, security breaches and sensitive information can be at risk. Hacking, unfortunately, has become common for computers and surveillance, undermining video security. Therefore, even a simple oversight of forgetting to change default passwords on newly installed cameras, DVRs and NVRs leave an opportunity open for surveillance networks to be hacked.
The security industry battles online threats constantly. Recent articles in industry news such as this one continue to relay the on-going risks associated with networked systems as well as providing helpful information on proactive prevention.
LTS remains vigilant in taking preventative measures to ensure safety against cyberattacks.
Protective Measures
Here are some "best practices" we follow and encourage our partners to follow as well:
- Network cameras should be on a separate firewalled or non-routed VLAN or physical LAN.
- Most security flaws for end-users result from simplifying default passwords and user names. Craft complex passwords, opposed to the same default passwords manufacturers leave on devices.
- LTS digital recorders and IP cameras support up to 16-character passwords. LTS has developed added security barriers which restrict installers from resetting passwords online. Installers must call-in and speak with a technical support representative who can verify the device. Once technical support has verified the credentials, the password is reset by the LTS support team, manually.
- Telnet port service has been disabled due to security concerns when using over an open network such as the Internet.
- UPnP has been disabled; the router will not allow devices to automatically control the resources of the router (i.e., port-forwarding).
- ONVIF open source integration is selectable and users have the option to turn it off to prevent risks on LTS network cameras.
Creating Safe Passwords
Safeguarding a Password
The task of choosing a new password to withstand a hack is daunting. Passwords should be hard to hack, but easy to remember. Simplified passwords like a pet’s name, common phrase, or an easy numeric or letter sequence should be avoided, for they are all too common and easily hacked. Analytics from CNET.com suggest having a customer choose a 16-character password which includes: number, special characters, and upper and lowercase sequences.
Choosing a long password is a great first step towards cybersecurity. The security industry rates passwords in bits. A shorter password might be 30 bits, whereas a 16-character password might be 80 bits and much harder to hack.
But remembering a 16-character password is difficult, especially with multiple email accounts, smart devices, computers, phone numbers, and account numbers that all require the same level of protection.
Establishing a System
With so many passwords to remember, adding a 16-character password for a surveillance system might feel like it overcomplicates security. However, with an established system for complex passwords, it will make things easier. There are many good options for remembering passwords. One example is to pull the first letter of a long sentence to make an acronym.
“I hope the Dodgers will win the World Series in 2024!”. The acronym to remember would look like this: “IHTDWWTWSI2024!”
Managing Passwords
Another option is to utilize a password generator. LastPass is a popular password generator and manager that will populate your desired password length and password formula such as letters and numbers. It also stores your private passwords to make it easier to remember login credentials.
Looking Ahead
In today’s world, video systems are networked to bring video access to users anywhere. However, this convenience of access comes at a price, as systems are no longer closed and thus compromise safety. Any connection to the Internet makes a system susceptible to an attack. One must realize the threat of security breaches will never be fully eliminated. The solution lies in consistently managing and evolving security measures and systems.
Firmware Updates
Keeping LTS devices updated with the latest firmware is another critical step in maintaining the best possible cybersecurity. Be sure to bookmark the LTS Downloads page so that you can stay up-to-date on the latest security patches as well as software, mobile apps, and other online tools. And keep an eye out for information from LTS on cyber-related news.