How to Keep Your Physical Security Systems from Getting Hacked

Physical security systems are vulnerable to cyber attacks if you don’t take appropriate precautions. Here’s how to reduce your risk.

In Campus Safety’s last interview with Chuck Davis, who is the director of cyber security at Hikvision, he explained that physical security professionals need to care about cyber security because most physical security and life safety systems are now connected to the Internet, making them vulnerable to being hacked by cyber criminals. Davis, who is also an adjunct professor on cyber security at the University of Denver, also discussed the specific vulnerabilities that campuses must address.

In our second interview with Davis, he describes some of the steps campus security technicians can do right now to limit their physical security systems’ vulnerability to hacking.

Chuck Davis: The first thing you need to do is apply something called “defense in-depth.” Make sure that you’ve got firewalls and different network controls in place to keep systems that don’t need access to the internet away from the internet.

Also, network segmentation inside of organizations. A lot of organizations create a flat network, which means that all devices are on the same network… they can communicate and talk to each other. You don’t need your HR department having access to the finance servers and vice versa. So creating network segmentation is very important. That not only goes with your highly sensitive data, but also things like video surveillance and internet of things (IoT) devices. We need to put those on separate networks so that they can be appropriately monitored and controlled.

Campus Safety: And what about passwords? I know there are a lot of default passwords and settings out there. What should our readers do about those?

Davis: Defaults are really bad. Hackers love to focus on defaults because they realize a lot of people don’t change defaults, whether it’s default passwords or ports or different configurations. So, always make sure you’re changing those defaults. When it comes to passwords, you want to make sure you’re creating strong passwords, and there’s been a lot of talk over the years about what a strong password is. The National Institute of Standards and Technologies has some recommendations, and they’ve actually changed them over the past year or so from what they used to be from many years ago.

But really, I would say if you’re able to create a strong password, which includes multiple character sets: uppercase, lowercase, numbers and special characters, and make it long, that’s the most important piece. The longer the password, the better.

You might ask, “How am I supposed to remember all of these passwords?” The best practice nowadays is to use something called a “password management tool.” There are a number of them out there. Some are free, some of them cost a bit of money, but for the most part, you’re able to have those tools create passwords for you. I actually don’t know what most of my passwords are. I’ve got a password management tool that when I log into a website, it just puts the username and password in there for me.

CS: Also, I’ve heard good things about two-factor authentication.

Davis: Two-factor authentication is very important. I would say from a personal level and even into an enterprise level. So any place you’re able to implement two-factor authentication for your enterprise, for your students or the people who work in your enterprise, that’s important. Especially when that access is coming from the internet. So if your VPN-ing in a virtual private network into the network, using just a username and password means that if someone gets one of those passwords, they’re able to get inside of your network. If you have two-factor or multi-factor authentication, it makes it much more difficult because they would need to know the username and password, and then have the token, whether it’s a text message or an app on your phone. There are a number of apps like Google Authenticator, which is free, and you’re able to set that up.

I would also say that for social media and a lot of the tools and websites that we use today offer two-factor authentication, and a lot of people don’t know that. So go look at Facebook, LinkedIn, Twitter and all of those, and you’ll find you’ll be able to turn on two-factor authentication.

CS: And all these best practices, they don’t just apply to security cameras or access control systems, they apply to practically everything on the internet, right?

Davis: They really do, because they’re all computers. When we talk about video surveillance or any IoT devices again, those are computers that are sitting on the internet, and we have to get in the mindset where we understand that these are computers with operating systems, and we’ve got to treat them that way.

CS: I want to talk a little bit about vendors and how they manage their cyber security vulnerabilities. What should our readers look for in a vendor so they know that the vendors that they’re working with manage their cyber security vulnerabilities correctly?

Davis: That’s a really good question, and I think the first thing they need to do is reach out to those vendors. See if they have a vulnerability management program, ask some questions. A little bit of research goes a long way though. So I would recommend going to cve.mitre.org and look at the Common Vulnerabilities and Exposures database. You can do a quick search in there for any company, and if they have CVEs, that means that they have vulnerabilities that have been discovered and responsibly reported into the CVE database. If they don’t, that’s a little suspicious because either, A: they don’t know they have vulnerabilities and they’re not fixing them, or B: they know that they have them, but they’re not responsibly disclosing them to the public.

So it’s a very important piece and something I’d recommend that everybody do when they are talking about looking at new vendors.

If you appreciated this article and want to receive more valuable industry content like this, click here to sign up for our FREE digital newsletters!

About the Author

robin hattersley headshot
Contact:

Robin has been covering the security and campus law enforcement industries since 1998 and is a specialist in school, university and hospital security, public safety and emergency management, as well as emerging technologies and systems integration. She joined CS in 2005 and has authored award-winning editorial on campus law enforcement and security funding, officer recruitment and retention, access control, IP video, network integration, event management, crime trends, the Clery Act, Title IX compliance, sexual assault, dating abuse, emergency communications, incident management software and more. Robin has been featured on national and local media outlets and was formerly associate editor for the trade publication Security Sales & Integration. She obtained her undergraduate degree in history from California State University, Long Beach.

Leading in Turbulent Times: Effective Campus Public Safety Leadership for the 21st Century

This new webcast will discuss how campus public safety leaders can effectively incorporate Clery Act, Title IX, customer service, “helicopter” parents, emergency notification, town-gown relationships, brand management, Greek Life, student recruitment, faculty, and more into their roles and develop the necessary skills to successfully lead their departments. Register today to attend this free webcast!

Leave a Reply

Your email address will not be published. Required fields are marked *

Get Our Newsletters
Campus Safety Conference promo