{"id":266,"date":"2020-08-27T07:02:12","date_gmt":"2020-08-27T06:02:12","guid":{"rendered":"https:\/\/www.itminister.co.uk\/blog\/?p=266"},"modified":"2020-08-27T07:02:12","modified_gmt":"2020-08-27T06:02:12","slug":"smart-security-cameras-using-them-safely-in-your-home-2","status":"publish","type":"post","link":"https:\/\/www.itminister.co.uk\/blog\/smart-security-cameras-using-them-safely-in-your-home-2\/","title":{"rendered":"Smart&#8217; security cameras: Using them safely in your home."},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">What is the issue with smart cameras?<\/h2>\n\n\n\n<p>Live feeds or images from smart cameras can (<a href=\"https:\/\/www.which.co.uk\/news\/2019\/10\/the-cheap-security-cameras-inviting-hackers-into-your-home\/\">in rare cases<\/a>) be accessed by unauthorised users, putting your privacy at risk. This is possible because smart cameras are often configured so that you can access them whilst you&#8217;re away from home. The problem arises because some cameras are shipped with the <strong>default<\/strong> password set by the manufacturer, which is often well-known or guessable (such as <strong>admin<\/strong> or <strong>00000<\/strong>). Cyber criminals can use these well-known passwords (or other techniques) to access the camera remotely, and view live video or images in your home.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How do I make sure my smart camera is safe?<\/h2>\n\n\n\n<p>Taking the following steps will make it <strong>much<\/strong> harder for cyber criminals to access your smart camera.<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>If your camera comes with a default password, change it to <a href=\"https:\/\/www.ncsc.gov.uk\/blog-post\/three-random-words-or-thinkrandom-0\">a secure one<\/a>\u00a0&#8211; connecting\u00a0<a href=\"https:\/\/www.ncsc.gov.uk\/blog-post\/three-random-words-or-thinkrandom-0\">three random words<\/a>\u00a0which you&#8217;ll remember is a good way to do this.\u00a0You can usually change it using the app you use to manage the device. When you change the password, make sure you avoid the <a href=\"https:\/\/www.ncsc.gov.uk\/blog-post\/passwords-passwords-everywhere\">most commonly used passwords<\/a>.<\/li><li>Keep your camera secure by regularly updating it, and if available switch on the option to install software updates automatically so you don&#8217;t have to think about it. Using the latest software will not only improve your security, it often adds new features. Note that the software that runs your camera is sometimes referred to as <strong>firmware<\/strong>, so look for the words <strong>update<\/strong>, <strong>firmware<\/strong> or <strong>software<\/strong> within the app.<\/li><li>If you do not need the feature that lets you remotely view camera footage via the internet, we recommend you disable it. Note that doing this may also prevent you receiving alerts when movement is detected, and could stop the camera working with smart home devices (such as Alexa, Google Home or Siri). <a href=\"https:\/\/www.ncsc.gov.uk\/guidance\/smart-security-cameras-using-them-safely-in-your-home\">Source <\/a><\/li><\/ol>\n\n\n\n<p>iTM covers all aspects of cybersecurity from Home cyber security managed solutions to automated, manage threat intelligence, forensic investigations and cyber security training. Our objective is to support organisations and consumers at every step of their cyber maturity journey.<a href=\"https:\/\/www.itminister.co.uk\/contact.html\"> Contact Us<\/a> for more information.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is the issue with smart cameras? Live feeds or images from smart cameras can (in rare cases) be accessed by unauthorised users, putting your privacy at risk. This is possible because smart cameras are often configured so that you can access them whilst you&#8217;re away from home. The problem arises because some cameras are &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.itminister.co.uk\/blog\/smart-security-cameras-using-them-safely-in-your-home-2\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Smart&#8217; security cameras: Using them safely in your home.&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","beyondwords_generate_audio":"","beyondwords_integration_method":"","beyondwords_project_id":"","beyondwords_content_id":"","beyondwords_preview_token":"","beyondwords_player_content":"","beyondwords_player_style":"","beyondwords_language_code":"","beyondwords_language_id":"","beyondwords_title_voice_id":"","beyondwords_body_voice_id":"","beyondwords_summary_voice_id":"","beyondwords_error_message":"","beyondwords_disabled":"","beyondwords_delete_content":"","beyondwords_podcast_id":"","beyondwords_hash":"","publish_post_to_speechkit":"","speechkit_hash":"","speechkit_generate_audio":"","speechkit_project_id":"","speechkit_podcast_id":"","speechkit_error_message":"","speechkit_disabled":"","speechkit_access_key":"","speechkit_error":"","speechkit_info":"","speechkit_response":"","speechkit_retries":"","speechkit_status":"","speechkit_updated_at":"","_speechkit_link":"","_speechkit_text":""},"categories":[18,19,2],"tags":[],"class_list":["post-266","post","type-post","status-publish","format-standard","hentry","category-cyber-security-best-practice","category-home-cyber-security","category-iot"],"_links":{"self":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/266","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=266"}],"version-history":[{"count":1,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/266\/revisions"}],"predecessor-version":[{"id":267,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/266\/revisions\/267"}],"wp:attachment":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=266"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=266"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=266"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}