Finn Research Study: Why Employees Could Pose Greatest Cybersecurity Risk, Increase Vulnerability to Malware and Data Security Breaches

August 16, 2018

Hikvision Cybersecurity Efforts Educate Partners and Help to Minimize Security Concerns

Hikvision Cybersecurity Efforts Educate Partners and Help to Minimize Security Concerns


Security magazine reported on a new Finn Partners research study, which says that employees could pose the greatest cybersecurity risk to an organization, as many admit to clicking on a link or opening an attachment from a sender they did not recognize.

Results showed that 55 percent of employees are using their personal devices for work, “which directly impacts increased vulnerability to hackers, malware and data breaches,” according to the article. Further, only 25 percent of employees responded that they receive monthly training on “cyber hygiene,” best practices related to operating system updates, checking for security patches, and password protocols.

"While 31 percent of respondents have already been a victim of a breach or attack, the behavior patterns to elicit security breaches remain. The opportunity to invest and increase the cadence of security vulnerability training in our organizations is vital. It is no longer sufficient for organizations to roll out annual security trainings on the latest vulnerabilities," said Jodi Brooks, managing partner and tech practice lead at Finn Partners, in the article.

Hikvision has implemented a number of cybersecurity initiatives and tools to support employees and partners in an effort to minimize security concerns.

Hikvision Cybersecurity Efforts Provide Educational Resources for Partners
Hikvision’s cybersecurity resources provide educational resources for partners and employees, in an effort to reduce vulnerabilities and security concerns. Initiatives include a cybersecurity hotline for partner support, and the Source Code Transparency Center, which provides visibility for government agencies and law enforcement entities in the U.S. and Canada who want to review Hikvision’s source code.

Changing default passwords is one key action that can minimize risk of security breach or vulnerability to hacking. Hikvision’s director of cybersecurity and SIA Cybersecurity Advisory Board member, Chuck Davis, said the following in a recent Campus Safety magazine interview: “Defaults are really bad. Hackers love to focus on defaults because they realize a lot of people don’t change defaults, whether it’s default passwords or ports or different configurations. So, always make sure you’re changing those defaults."

To read the Security magazine article about the Finn Partners research study, click here. For more cybersecurity insights from Hikvision, visit this link.

IMPORTANT! This model requires non-standard firmware. Do Not Install standard firmware (e.g. v.4.1.xx) on this model. Doing so will permanently damage your system. You must use custom firmware v.4.1.25 from the iDS-9632NXI-I8/16S product page.

By downloading and using software and other materials available via this website, you agree to be legally bound by HIKVISION General Terms of Use . If you don’t agree to these terms, you may not download or use any of those materials.

If you are agreeing on behalf of your company, you represent and warrant that you have legal authority to bind your company to the General Terms of Use above. Also you represent and warrant that you are of the legal age of majority in the jurisdiction in which you reside (at least 18 years of age in many countries).