Quick Start Guide

MARGIN
GUIDES
Stay within the yellow
box. Do not let text go
beyond, instead move
to the next column or
start a new page.
8 | www.icrealtime.com
5C. Appendix: Cybersecurity Recommendations
Cybersecurity is more than just a buzzword: it’s something that pertains to
every device that is connected to the internet. IP video surveillance is not
immune to cyber risks, but taking basic steps toward protecting and
strengthening networks and networked appliances will make them less
susceptible to attacks. Below are some tips and recommendations on
how to create a more secured security system.
Mandatory actions to be taken for basic equipment network security:
1. Use Strong Passwords.
Here are some recommendations:
The length should not be less than 8 characters
Include at least two types of characters; character types include
upper and lower case letters, numbers and symbols
Do not include the account name or the account name in reverse
order
Do not use continuous characters such as 123, abc, etc.
Do not use repeated characters such as 111, aaa, etc
2. Update Firmware and Client Software regularly.
According to the standard procedure in Tech-industry, we
recommend to keep your equipment (such as NVR, DVR, IP
camera, etc.) firmware up-to-date to ensure the system is
equipped with the latest security patches and fixes. When the
equipment is connected to the public network, it is recommended to
enable the “auto-check for updates” function to obtain timely
information of firmware updates released by the manufacturer
We suggest that you download and use the latest version of client
software.
"Nice to have" recommendations to improve your equipment
network security:
Physical Protection. We suggest that you ensure physical
protection to equipment, especially storage devices. For
example, place the equipment in a special computer room
and rack cabinet, as well as implementing strong access
control permission and key management to prevent
unauthorized personnel from carrying out physical
contacts such as damaging hardware, unauthorized
connection of removable equipment (such as USB flash
disk, serial port), etc.
Change Passwords Regularly. We suggest that you
change passwords regularly to reduce the risk of being
guessed or cracked.
Maintain and Update Password Reset Information. The
equipment supports password reset function. Please
set up related information for password reset, including
the end users mailbox and password protection
questions. If the information changes, please modify it
accordingly. When setting password protection
questions, it is suggested not to use those that can be
easily guessed.
Enable Account Lock. The account lock feature is enabled
by default, and we recommend you to keep it on to
guarantee the account security. If an attacker attempts to
log in with the wrong password several times, the
corresponding account and the source IP address will be
locked