Best practice is to use a password that contains a mixture of lower and upper case numbers, letters and characters – if you don’t; you’re potentially leaving your information vulnerable.
This isn’t as inconvenient as it might sound, because if you are using a smart phone app to connect to the camera the app will remember the password for you.
By Simon Rice, Group Manager for Technology The danger of using weak passwords has been exposed again this month after a new website was launched that allows people to watch live footage from some of the insecure cameras across the world.
While it’s perfectly natural for you to want to set your camera up as quickly as possible, take time to read the manual and familiarise yourself with the security options available to you.
The ability to access footage remotely is both an internet cameras biggest selling point and, if not setup correctly, potentially its biggest security weakness.
The footage is being collected from security cameras used by businesses and members of the public, ranging from CCTV networks used to keep large premises secure, down to built-in cameras on baby monitors.
And with 350,000 of these cameras sold in the UK alone last year, this is a threat that all of us need to be aware of and be taking action to protect against.
Remember, if you can access your video footage over the internet then what is stopping someone else from doing the same?
You may think that having to type in an obscure web address to access the footage provides some level of protection.
If you have a camera in your home and have no intention of viewing the footage over the internet, then the best thing to do is to go into the device’s security settings and see if you can turn the remote viewing option off.
Selecting this option will not normally stop you from viewing the footage using your home Wi-Fi network, however read the manufacturer’s instructions to see what controls are available on your device.
It often works by asking you a security question, or by sending a code to your mobile phone that you must enter during the login process.
So if you have this option turned on, your information should still remain secure even if your password is compromised.
We all need to be aware of the threats that exist to our personal information.