Cybersecurity for video surveillance systems

1 September 2019 Information Security, Surveillance

Video surveillance to ensure safety and security helps billions of people each day. From a family wandering around a safe shopping centre under the watchful eye of a video surveillance camera, or concerned parents monitoring a sleeping baby; video surveillance touches all of our lives.

With all these benefits, video surveillance systems have become a potential target for attack by criminals. In the past, attacks against video surveillance networks were rare due to the closed nature of systems that would often link via private, directly cabled networks to on-site control rooms.

However, times change and modern video cameras are effectively computers running software connected to a video camera. With the rise of the Internet and lower-cost cameras, video surveillance systems are increasingly accessible over any IP network, which has led to the rise of potential cyberattack.

Real-world incident

Cyberattacks against video surveillance devices are often not detected or reported. However, when these devices are taken over and then used to attack other Internet resources, the issues are harder to ignore.

A massive attack in 2016 that impacted Twitter, Amazon, Tumblr, Reddit, Spotify and Netflix was, in part, generated by a network of video surveillance devices that had been taken over by a cyberattack. The botnet is mainly comprised of digital video recorders (DVRs) and IP cameras made by a Chinese technology company. The components made are sold downstream to vendors who then use it in their own products, leading to tens of thousands of devices co-opted into these dangerous cyber weapons.

Introducing the Mobotix Cactus Concept

In response to these issues, Mobotix has created a cybersecurity strategy called the ‘Cactus Concept’ that aims to deliver a comprehensive approach to protecting Mobotix products against the threat of cyberattacks. The cactus symbolises the core idea behind the Mobotix cybersecurity strategy, where every piece of hardware and software is protected by an array of defences to stop external threats.

Mobotix is unusual within the industry as it develops all of its own software in-house and does not license its technology to third parties. This innovative approach offers significant benefit when it comes to security. By controlling the entire chain of software development, Mobotix is less vulnerable to third-party weaknesses that have impacted other brands where a vulnerability within a third-party software component or hardware leads to a security problem. The Cactus Concept is a “security by design ethos” that has been within the company from day one.

The popularity of video surveillance is rising, as are the threats from cyberattack. Mobotix is actively protecting its devices against the risks and its Cactus Concept aims to raise awareness among potential and existing Mobotix customers of the extremely important issue of data security in network-based video security systems.

Visit the Mobotix Cactus Concept page on the website for more information: www.cactusconcept.com




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Managed security solutions for organisations of all sizes
Information Security News & Events
Cyber attackers have become significantly more sophisticated and determined, targeting businesses of all sizes. PwC’s Global Digital Trust Insights Survey 2025 Africa and South Africa highlights the urgent need for organisations to implement robust cyber risk mitigation strategies.

Read more...
Data resilience at VeeamON
Technews Publishing SMART Security Solutions Infrastructure Information Security
SMART Security Solutions attended the VeeamON Tour in Johannesburg in August to learn more about data resilience and Veeam’s initiatives to enhance data protection, both on-site and in the cloud.

Read more...
Identity, Security & Access Alliance focuses on intelligence and integration
SMART Security Solutions Ideco Biometrics BoomGate Systems Bosch Building Technologies Technews Publishing Integrated Solutions Surveillance Access Control & Identity Management
The Identity, Security & Access Alliance (ISAA) hosted several launch events in Johannesburg in August, showcasing the participating companies’ technical solutions with a primary focus on the solutions made possible by integrating high-quality systems to deliver comprehensive solutions.

Read more...
Make BIG and COMPLEX small and manageable
neaMetrics Suprema AI & Data Analytics Surveillance Integrated Solutions
Traditional CCTV and access systems often operate separately, creating gaps in visibility and efficiency. TRASSIR and Suprema have partnered to develop an integrated platform that improves security, operations, and situational awareness.

Read more...
Get the AI fundamentals right
Technews Publishing SMART Security Solutions Leaderware Editor's Choice Surveillance AI & Data Analytics
Much of the marketing for CCTV AI detection implies the client can just drop the AI into their existing systems and operations, and they will be detecting all criminals and be far more efficient when doing it.

Read more...
SMART Surveillance Conference in Johannesburg
Arteco Global Africa Technews Publishing SMART Security Solutions Axis Communications SA neaMetrics Editor's Choice Surveillance Security Services & Risk Management Logistics (Industry) AI & Data Analytics
SMART Security Solutions hosted its annual SMART Surveillance Conference in Johannesburg in July, welcoming several guests, sponsors, and speakers for an informative and enjoyable day examining the evolution of the surveillance market.

Read more...
Securing South Africa’s logistics sector
Secutel Technologies Products & Solutions Surveillance Logistics (Industry)
Unlike traditional guarding services, Visual Verifier operates on an ‘Always On’ principle, ensuring continuous 24/7 coverage of warehouses, depots, transit hubs, and delivery points.

Read more...
Troye exposes the Entra ID backup blind spot
Information Security Infrastructure
If you trust Microsoft to protect your identity, think again. Many organisations naively believe that Microsoft’s shared responsibility model covers Microsoft Entra?ID – formerly Azure AD – but it does not.

Read more...
Secure data protection without hardware lock-in
Infrastructure Information Security News & Events
New Veeam Software Appliance empowers IT teams to achieve instant protection with Veeam’s fully preconfigured, software-only appliance, delivering enterprise-ready simplified deployment and operational efficiency, robust cyber resilience.

Read more...
Check Point launches open, vendor-neutral MDR services
Information Security News & Events Products & Solutions
New Check Point MDR 360° and MXDR 360° offerings deliver 24/7 managed continuous threat monitoring protection across endpoints, cloud and network environments with built-in identity threat detection and 160+ integrations across hybrid, multi-vendor environments.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.