• MON - FRI 8:00 AM - 5:00 PM
  • 313, Samora Machel, Harare

How to protect an access point from cyber attack

Credible manufacturers have added cyber security elements to their products and systems in order to assist installers and integrators with regards to delivering robust and resilient solutions. There are a number of steps that can be taken at the edge device level which enhance cyber security and help mitigate the risks of on-line threats. With the help of Steve Kenny, Business Development Manager Architecture & Engineering Program at Axis Communications, Benchmark considers how device hardening can be implemented. Cyber security is a complex issue, but there are also several basic procedures that installers and integrators can implement that will help to reduce risk. One of the most basic is device hardening; by reducing the attack surface, the potential number of unauthorised entry points is significantly reduced. Like many credible manufacturers, Axis has applied cyber security best practices in the design and development of its devices. This provides the necessary tools to enable engineers to minimise the risk of weaknesses that could be exploited in a cyber attack. Securing a network, its devices and the supported services requires participation by manufacturers, installers and integrators, service providers and the end-user. Edge devices, such as security cameras, in a network environment face threats including physical sabotage, vandalism and tampering. To protect against such threats, installers and integrators should consider the use of vandal-resistant devices or housings along with protection for the cables

Copyright © Compulink Systems. All Rights Reserved