SSI Reports on the Three Best Ways to Test for Cybersecurity Vulnerabilities

August 28, 2018

SSI Reports on the Three Best Ways to Test for Cybersecurity Vulnerabilities

Hikvision Cybersecurity Director Offers Tips to Prevent Malware, Cyberattacks


In the Security Sales & Integration (SSI) article, “Is Your Business Vulnerable? How to Test for Cybersecurity Weaknesses,” companies are advised to protect themselves from cyberattacks by actively identifying and assessing vulnerabilities. 

Fifty-five percent of U.S. companies experienced a cyberattack from 2015 to 2016. From the article: “If your business is connected to the Internet and processes data of any kind, it may be vulnerable to cyber criminals. To help keep your company protected from cyberattacks, it is first essential to ascertain where vulnerabilities lie so that they can be dealt with as soon as possible. This is just as true for security integration businesses as any other. After all, your customers are putting their safety and valuables in your hands — shouldn’t you make sure your business is protected as well?”

Three Best Ways to Test Systems for Vulnerabilities
While there are numerous ways to test systems, the SSI article recommends the following as the three best methods for identifying system weaknesses:

  1. Perform penetration testing: This involves cybersecurity professionals using hacker methods to try to gain access to your systems, such as attempting to bypass security infrastructure or “exploit hidden backdoors within networks and applications,” according to the article.
  2. Implement a red team operation: A step beyond penetration testing, a specialized expert team will simulate a real cyberattack to observe the effectiveness of your systems, and how you will respond.
  3. Train and test staff: The article recommends establishing a baseline of employee knowledge by testing the current cybersecurity knowledge of your team and then training them. Teaching them how to spot phishing emails and create complex passwords is a great starting point.

Hikvision’s cybersecurity director, Chuck Davis, recently provided an overview of how to spot phishing emails in this blog.

Hikvision Offers Tips to Prevent Malware, Cyberattacks
Davis offered tips to prevent cyberattacks in a recent article, where he stated that “malware is one of the most often used components in cyberattacks. Two of the most prevalent attack methods are network scanning and phishing. A typical network scanning attack occurs when a system scans a network (frequently the Internet) looking for vulnerable systems. When it finds one, it will exploit the vulnerability and infect the system with malware. Often, the infected system will begin scanning and infecting systems as well.”

In the article, Davis recommended protecting computers from vulnerabilities by removing old software programs and installing patches on a routine basis. Updating firmware safeguards equipment by patching known vulnerabilities, often adding features, and sometimes improving system performance.

Another effective way to reduce vulnerabilities is with network segmentation and firewalls. Placing devices behind firewalls helps to protect them from untrusted networks such as the Internet. Network segmentation splits a network into separate networks that are isolated, not connected. This means a compromise in one part of the network won’t compromise the other, such as human resources and finance.

Other tips included resetting default passwords and using complex passwords, rebooting all home routers and small office routers per the FBI’s guidance earlier this year, and running active scans and updates.

Click here to read the entire blog, “Hikvision Cybersecurity Director Offers Top Five Tips On How To Prevent Malware, Cyberattacks.”

To read the SSI article on ways to identify cybersecurity vulnerabilities, visit this link.

IMPORTANT! This model requires non-standard firmware. Do Not Install standard firmware (e.g. v.4.1.xx) on this model. Doing so will permanently damage your system. You must use custom firmware v.4.1.25 from the iDS-9632NXI-I8/16S product page.

By downloading and using software and other materials available via this website, you agree to be legally bound by HIKVISION General Terms of Use . If you don’t agree to these terms, you may not download or use any of those materials.

If you are agreeing on behalf of your company, you represent and warrant that you have legal authority to bind your company to the General Terms of Use above. Also you represent and warrant that you are of the legal age of majority in the jurisdiction in which you reside (at least 18 years of age in many countries).