DIY P2P cameras – a security device, or, a risk concern?
For all of us who love the benefits of having instant view to an IP camera system and enjoy the control from mobile / remote device – a piece of advice about the effect which those gadgets could cause to business and home IT networks:
Apps used for remote access of IP cameras usually punch access through firewall ports all the way from the site where camera is located up to the remote device of the user.
P2P devices use cloud-based servers for verification, and therefore user should be considering how legit the equipment manufacturer, cloud server and app developer are.
Recommended basic protection measures
Passwords for camera access
It would not be a good idea at all to have a data from a very private IP camera at home snatched from prying eyes or hackers.
Move away from default IP addresses, passwords and settings. The least measure is during installation to create strong and totally unique passwords, and those passwords should never be referring to those ones used for access to important email accounts, bank accounts, confidential devices etc.
Also, it is strongly advisable to change the admin passwords in pre-scheduled intevals, probably once a month is a good idea.
Router Protection
Change default Router Password
It is surprising how many internet access routers are deployed and operate under default admin passwords. Same applies for WiFi networks and other ports for access to the router and therefore inside the private network/
The very simple procedure of creating stronger admin and WiFi access password is the way to start protecting your digital home.
Disable UPnP function
It is recommended to check the settings of the router and disable UPnP function, where usually some services can pass through.
DDNS
There are mixed opinions about the security factor related to use of DDNS service, but good argument is that the IP address of the network router changes dynamically, making it more difficult to discover from outside world.
Port Forwarding
It is worth the effort to set port forwarding rules and if possible move away from the default service ports. Then, the remote access to the IP camera system would be via more discrete than the advertised default ports.
Those are the very basic recommendations for improving the network and IP camera security . Although every device and network can theoretically be compromised, our suggestion would help for improving the level of security of your system.
More comprehensive notes and recommendations will follow with the next post. Thank you!
To Be Continued…