IC Realtime NVR-MX08POE-1U4K1-WEB Product Manual - Page 8

for updötes function

Page 8 highlights

5C. Appendix: Cybersecurity Recommendations Cybersecurity is more than just a buzzword: it's something that pertains to every device that is connected to the internet. IP video surveillance is not immune to cyber risks, but taking basic steps toward protecting and strengthening networks and networked appliances will make them less susceptible to attacks. Below are some tips and recommendations on how to create a more secured security system. Mandatory actions to be taken for basic equipment network security: 1. Use Strong Passwords. Here are some recommendations: ● The length should not be less than 8 characters ● Include at least two types of characters; character types include upper and lower case letters, numbers and symbols ● Do not include the account name or the account name in reverse order ● Do not use continuous characters such as 123, abc, etc. ● Do not use repeated characters such as 111, aaa, etc 2. Update Firmware and Client Software in Time ● According to the standard procedure in Tech-industry, we recommend to keep your equipment (such as NVR, DVR, IP camera, etc.) firmware up-to-date to ensure the system is equipped with the latest security patches and fixes. When the equipment is connected to the public network, it is recommended to enable the "auto-check for updates" function to obtain timely information of firmware updates released by the manufacturer ● We suggest that you download and use the latest version of client software. "Nice to have" recommendations to improve your equipment network security: ● Physical Protection. We suggest that you ensure physical protection to equipment, especially storage devices. For example, place the equipment in a special computer room and rack cabinet, as well as implementing strong access control permission and key management to prevent unauthorized personnel from carrying out physical contacts such as damaging hardware, unauthorized connection of removable equipment (such as USB flash disk, serial port), etc. ○ ● Change Passwords Regularly. We suggest that you change passwords regularly to reduce the risk of being guessed or cracked. ● Maintain and Update Password Reset Information. The equipment supports password reset function. Please set up related information for password reset, including the end user's mailbox and password protection questions. If the information changes, please modify it accordingly. When setting password protection questions, it is suggested not to use those that can be easily guessed. ○ ● Enable Account Lock. The account lock feature is enabled by default, and we recommend you to keep it on to guarantee the account security. If an attacker attempts to log in with the wrong password several times, the corresponding account and the source IP address will be locked 8 | www.icrealtime.com

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9

"
|
www.icreöltime.com
µC¶ Appendix$ Cybersecurity Recommendations
!ybersecurity is more thön just ö buzzword: it’s something thöt pertöins to
every device thöt is connected to the internet. ³¶ video surveillönce is not
immune
to
cyber
risks,
but
töking
bösic
steps
towörd
protecting
önd
strengthening networks önd networked öppliönces will möke them less
susceptible
to
öttöcks.
´elow
öre
some
tips
önd
recommendötions on
how to creöte ö more secured security system.
¼öndötory öctions to be töken for bösic equipment network security:
1.
°s± ²trŬš³ ´µsswŬr¶s.
¸ere öre some recommendötions:
Ƭ
·he length should not be less thön 8 chöröcters
Ƭ
³nclude öt leöst two types of chöröcters; chöröcter types include
upper önd lower cöse letters, numbers önd symbols
Ƭ
'o not include the öccount nöme or the öccount nöme in reverse
order
Ƭ
'o not use continuous chöröcters such ös 123, öbc, etc.
Ƭ
'o not use repeöted chöröcters such ös 111, ööö, etc
2.
°Ə¶µt± I·r¸wµr± µš¶ !¹·±št ²Ŭºtwµr± ·š »·¸±
Ƭ
²ccording
to
the
stöndörd
procedure
in
·ech-industry,
we
recommend
to
keep
your equipment
(such
ös
½ßµ,
'ßµ,
³¶
cömerö,
etc.)
firmwöre
up-to-döte
to
ensure
the system is
equipped with the lötest security pötches önd fixes. àhen the
equipment is connected to the public network, it is recommended to
enöble the “öuto-check
for updötes” function
to
obtöin
timely
informötion of firmwöre updötes releösed by the mönuföcturer
Ƭ
àe suggest thöt you downloöd önd use the lötest version of client
softwöre.
"¼·½± tŬ ¾µv±" r±½Ŭ¸¸±š¶µt·Ŭšs tŬ ·¸ƏrŬv± yŬur ±qu·Ə¸±št
š±twŬr¿ s±½ur·ty:
Ƭ
´¾ys·½µ¹ ´rŬt±½t·Ŭš.
àe suggest thöt you ensure physicöl
protection to equipment, especiölly storöge devices. Gor
exömple, plöce the equipment in ö speciöl computer room
önd
röck cöbinet, ös well ös implementing strong öccess
control
permission
önd
key
mönögement
to
prevent
unöuthorized
personnel
from
cörrying
out
physicöl
contöcts
such
ös
dömöging
hördwöre,
unöuthorized
connection of removöble equipment (such ös ȱ´ flösh
disk, seriöl port), etc.
Ɣ
Ƭ
!¾µš³±
´µsswŬr¶s
À±³u¹µr¹y.
àe
suggest
thöt
you
chönge pösswords regulörly to reduce the risk of being
guessed or cröcked.
Ƭ
Áµ·štµ·š µš¶ °Ə¶µt± ´µsswŬr¶ À±s±t šºŬr¸µt·Ŭš.
·he
equipment
supports
pössword
reset
function.
¶leöse
set up relöted informötion for pössword reset, including
the
end
user’s
möilbox
önd
pössword
protection
questions. ³f the informötion chönges, pleöse modify it
öccordingly.
àhen
setting
pössword
protection
questions, it is suggested not to use those thöt cön be
eösily guessed.
Ɣ
Ƭ
GšµÃ¹± Ľ½Ŭušt ÅŬ½¿
. ·he öccount lock feöture is enöbled
by
deföult,
önd
we
recommend
you
to keep it
on
to
guöröntee the öccount security. ³f ön öttöcker öttempts to
log
in
with
the
wrong
pössword
severöl
times,
the
corresponding öccount önd the source ³¶ öddress will be
locked