Smart doorbell security

Tomáš Vystavěl, Chief Product Officer at 2N, said: “Installing a smart doorbell offers users convenience, flexibility and home security. But as Which? has identified, consumers must look for excellent security standards, not just a good user experience. The 2N Indoor View uses 2N’s own operating system to provide users with the highest levels of security and protecting their personal data. No one wants to unwittingly give hackers opportunities to access their personal information. Consumers are strongly advised to do their research before choosing a video intercom device.”

2N Indoor View

2N has just released the new 2N® Indoor View answering unit, the latest product in its portfolio of award-winning answering units. Developed with a focus on protecting customers from cybersecurity threats, the 2N® Indoor View uses 2N’s own operating system to provide users with the highest levels of security and protecting their personal data.

Prevention

The following are high risk factors for security breaches. 2N’s Indoor View avoids these weaknesses.

  • Flaws in the operating system coding which would enable hackers to gain full access to the intercom device
  • Web security weaknesses that allow an attacker to carry out random operating system (OS) commands on the server that is running an application, thus enabling access to the application and all its data
  • Vulnerabilities in the system that allow a remote attacker to upload a manipulated ringtone file which could enable a complete system takeover
  • Unsecured, non-encrypted communication that allow an attacker to listen in the conversation (man-in-the-middle attack)

Additional advice

Advice from 2N includes:

  • Choose a reliable, bespoke security solution tailored specifically for ICS environments that keeps your network secure at all times.
  • Create an independent network – dedicated exclusively to devices that handle sensitive information; using the virtual LAN (VLAN) and ensure that manufacturers of installed devices or software use implementation protocols such as HTTPS, TLS, SIPS or SRTP by default.
  • Protect the IoT ecosystem: create a separate network for IoT devices, choose a strong password for the router, never install new electronic devices without checking the manufacturer and security standards.
  • Create different accounts with different privileges: a user will only be able to make changes related to their specific tasks, while the administrator will be given greater privileges to manage the building and all linked accounts.
  • Update the software regularly: installing the latest firmware version on devices is important to mitigate cybersecurity risks. Each new release fixes bugs found on the software by implementing the latest security patches.
  • Use strong complex passwords of at least six characters and consisting of a combination of numbers, letters and symbols.
  • Conduct regular security audits of the IT infrastructure to identify and eliminate possible vulnerabilities.

 

To stay up to date on the latest, trends, innovations, people news and company updates within the global security market please register to receive our newsletter here.

Media contact

Rebecca Morpeth Spayne,
Editor, Security Portfolio

Tel: +44 (0) 1622 823 922
Email: [email protected]

Georgina Turner image

Georgina Turner

Sales Manager

Read the Latest Issue

Follow us on X

Follow us on X

Click Here

Follow us on LinkedIn

Follow us on LinkedIn

Click Here

Advertise here

Reach decision makers and amplify your marketing

Advertise here

Click Here

Related News

Graphic displaying a lockdown solution

Netgenium debuts next gen display and touchscreen technologies

Power-over-Ethernet (PoE) solutions specialist Netgenium will be showcasing its new range of IP…

ICT® Launches New TSL Access Reader Series

Integrated Control Technology (ICT®), a leading manufacturer of intelligent access control and…
Image Provided by Paxton

Paxton Partners with Skills for Security

The security technology manufacturer Paxton is proud to announce a partnership with Skills for Security…
Image Provided by ICT

ICT and Ingram Micro sign distribution agreement MEA

Integrated Control Technology (ICT), award-winning global manufacturer of intelligent electronic access control and security solutions..
Image Provided by Toshiba

Toshiba launches new HDD Innovation Lab

Toshiba Electronics Europe GmbH (Toshiba) has inaugurated a new HDD Innovation Laboratory (HDD Innovation Lab) at its site in Düsseldorf..
Image Provided by Verkada

Verkada Doubles Down on the Channel with Strategic New Hire

Verkada, a leader in cloud-based physical security, today announced the appointment of Micah Deriso as Head of Global Channel…
Image Provided by IPSA

IPSA Appoint Frontline Hero as Ambassador

Abdullah, the courageous security officer praised for foiling a horrific knife attack at Leicester Square, has been appointed as…
Image Provided by Codelocks

New Surface Latch from Codelocks

Codelocks is expanding its Gate Solutions by Codelocks range with the introduction of the new Codelocks’ Surface Latch…
Image provided by Genetec

Nicholas Smith to Lead Genetec UK and Ireland Operations

Genetec, provider of enterprise physical security software, announced the appointment of Nicholas Smith as its new Regional Sales Director…
Scroll to Top