IC Realtime NVR-MX08POE-1U4K1-WEB Product Manual - Page 8
for updötes function
View all IC Realtime NVR-MX08POE-1U4K1-WEB manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 8 highlights
5C. Appendix: Cybersecurity Recommendations Cybersecurity is more than just a buzzword: it's something that pertains to every device that is connected to the internet. IP video surveillance is not immune to cyber risks, but taking basic steps toward protecting and strengthening networks and networked appliances will make them less susceptible to attacks. Below are some tips and recommendations on how to create a more secured security system. Mandatory actions to be taken for basic equipment network security: 1. Use Strong Passwords. Here are some recommendations: ● The length should not be less than 8 characters ● Include at least two types of characters; character types include upper and lower case letters, numbers and symbols ● Do not include the account name or the account name in reverse order ● Do not use continuous characters such as 123, abc, etc. ● Do not use repeated characters such as 111, aaa, etc 2. Update Firmware and Client Software in Time ● According to the standard procedure in Tech-industry, we recommend to keep your equipment (such as NVR, DVR, IP camera, etc.) firmware up-to-date to ensure the system is equipped with the latest security patches and fixes. When the equipment is connected to the public network, it is recommended to enable the "auto-check for updates" function to obtain timely information of firmware updates released by the manufacturer ● We suggest that you download and use the latest version of client software. "Nice to have" recommendations to improve your equipment network security: ● Physical Protection. We suggest that you ensure physical protection to equipment, especially storage devices. For example, place the equipment in a special computer room and rack cabinet, as well as implementing strong access control permission and key management to prevent unauthorized personnel from carrying out physical contacts such as damaging hardware, unauthorized connection of removable equipment (such as USB flash disk, serial port), etc. ○ ● Change Passwords Regularly. We suggest that you change passwords regularly to reduce the risk of being guessed or cracked. ● Maintain and Update Password Reset Information. The equipment supports password reset function. Please set up related information for password reset, including the end user's mailbox and password protection questions. If the information changes, please modify it accordingly. When setting password protection questions, it is suggested not to use those that can be easily guessed. ○ ● Enable Account Lock. The account lock feature is enabled by default, and we recommend you to keep it on to guarantee the account security. If an attacker attempts to log in with the wrong password several times, the corresponding account and the source IP address will be locked 8 | www.icrealtime.com