Smart’ security cameras: Using them safely in your home.

What is the issue with smart cameras?

Live feeds or images from smart cameras can (in rare cases) be accessed by unauthorised users, putting your privacy at risk. This is possible because smart cameras are often configured so that you can access them whilst you’re away from home. The problem arises because some cameras are shipped with the default password set by the manufacturer, which is often well-known or guessable (such as admin or 00000). Cyber criminals can use these well-known passwords (or other techniques) to access the camera remotely, and view live video or images in your home.

How do I make sure my smart camera is safe?

Taking the following steps will make it much harder for cyber criminals to access your smart camera.

  1. If your camera comes with a default password, change it to a secure one – connecting three random words which you’ll remember is a good way to do this. You can usually change it using the app you use to manage the device. When you change the password, make sure you avoid the most commonly used passwords.
  2. Keep your camera secure by regularly updating it, and if available switch on the option to install software updates automatically so you don’t have to think about it. Using the latest software will not only improve your security, it often adds new features. Note that the software that runs your camera is sometimes referred to as firmware, so look for the words update, firmware or software within the app.
  3. If you do not need the feature that lets you remotely view camera footage via the internet, we recommend you disable it. Note that doing this may also prevent you receiving alerts when movement is detected, and could stop the camera working with smart home devices (such as Alexa, Google Home or Siri). Source

iTM covers all aspects of cybersecurity from Home cyber security managed solutions to automated, manage threat intelligence, forensic investigations and cyber security training. Our objective is to support organisations and consumers at every step of their cyber maturity journey. Contact Us for more information.

Leave a Reply

Your email address will not be published. Required fields are marked *