The danger of using weak passwords has been exposed again this month after a new website was launched that allows people to watch live footage from some of the insecure cameras across the world. The website, which is based in Russia, accesses the information by using the default log-in credentials, which are freely available online, for thousands of cameras.
The footage is being collected from security cameras used by businesses and members of the public, ranging from CCTV networks used to keep large premises secure, down to built-in cameras on baby monitors. This is a threat that all of us need to be aware of and be taking action to protect against.
So what actions should you be taking right now to make sure people aren’t able to access the information being filmed by your device?
Change your default password
If you take only one security step when getting any new device, make sure it’s setting a strong password.
When you begin using your camera you may be given a simple default password that you’ll need to enter to get the device working. This might be blank or something as simple as ‘password’ or ‘12345’ but, even if it isn’t, the default passwords many manufacturers use are freely available online so make sure you get it changed. If the device doesn’t have a password, then, as a bare minimum, you should set one up.
When choosing your password make sure it’s not one that can be easily guessed. Best practice is to use a password that contains a mixture of lower and upper case numbers, letters and characters – if you don’t; you’re potentially leaving your information vulnerable. This isn’t as inconvenient as it might sound, because if you are using a smart phone app to connect to the camera, the app will remember the password for you.
Check all the available security settings
Most camera systems come with instructions explaining how to keep the footage you’re capturing secure.
While it’s perfectly natural for you to want to set your camera up as quickly as possible, take the time to ask your installers/vendors what security options are available to you.
The ability to access footage remotely is both an Internet cameras’ biggest selling point and, if not setup correctly, potentially its biggest security weakness. Remember, if you can access your video footage over the Internet then what is stopping someone else from doing the same?
You may think that having to type in an obscure web address to access the footage provides some level of protection. However, this will not protect you from the remote software that hackers often use to scan the Internet for vulnerable devices. In some cases, insecure cameras can be identified using nothing more than an Internet search engine.
If you have a security camera, and have no intention of viewing the footage over the Internet, then the best thing to do is to go into the device’s security settings and see if you can turn the remote viewing option off. Selecting this option will not normally stop you from viewing the footage using your local Wi-Fi network.
Secure all of your other devices with an Internet connection
Think of how much personal information is stored on your laptop or tablet. You may have financial information, including bank statements, health information, such as letters from your local hospital, or other information you’d rather keep private.
Many programs and apps also now upload and store your information on cloud servers rather than, or as well as, the device’s hard drive. The use of the cloud and all of these devices further increases the amount of information that’s potentially available if you fail to take adequate steps to keep your information secure.
You should already have a strong password on your laptop, tablet or computer to stop a person accessing the information on your device or on the cloud service it uses. However, some cloud services allow you to go a step further by offering two-step authentication.
Two-step authentication offers you an additional layer of security when logging in to an online service. It often works by asking you a security question, or by sending a code to your mobile phone that you must enter during the log-in process. So if you have this option turned on, your information should still remain secure even if your password is compromised.
We all need to be aware of the threats that exist to our personal information. However, the basic steps covered in this blog are steps all of us should be taking as a matter of routine. If you don’t, then you’re leaving your information vulnerable and no one likes being watched by a stranger.