Smart doorbell security

Tomáš Vystavěl, Chief Product Officer at 2N, said: “Installing a smart doorbell offers users convenience, flexibility and home security. But as Which? has identified, consumers must look for excellent security standards, not just a good user experience. The 2N Indoor View uses 2N’s own operating system to provide users with the highest levels of security and protecting their personal data. No one wants to unwittingly give hackers opportunities to access their personal information. Consumers are strongly advised to do their research before choosing a video intercom device.”

2N Indoor View

2N has just released the new 2N® Indoor View answering unit, the latest product in its portfolio of award-winning answering units. Developed with a focus on protecting customers from cybersecurity threats, the 2N® Indoor View uses 2N’s own operating system to provide users with the highest levels of security and protecting their personal data.


The following are high risk factors for security breaches. 2N’s Indoor View avoids these weaknesses.

  • Flaws in the operating system coding which would enable hackers to gain full access to the intercom device
  • Web security weaknesses that allow an attacker to carry out random operating system (OS) commands on the server that is running an application, thus enabling access to the application and all its data
  • Vulnerabilities in the system that allow a remote attacker to upload a manipulated ringtone file which could enable a complete system takeover
  • Unsecured, non-encrypted communication that allow an attacker to listen in the conversation (man-in-the-middle attack)

Additional advice

Advice from 2N includes:

  • Choose a reliable, bespoke security solution tailored specifically for ICS environments that keeps your network secure at all times.
  • Create an independent network – dedicated exclusively to devices that handle sensitive information; using the virtual LAN (VLAN) and ensure that manufacturers of installed devices or software use implementation protocols such as HTTPS, TLS, SIPS or SRTP by default.
  • Protect the IoT ecosystem: create a separate network for IoT devices, choose a strong password for the router, never install new electronic devices without checking the manufacturer and security standards.
  • Create different accounts with different privileges: a user will only be able to make changes related to their specific tasks, while the administrator will be given greater privileges to manage the building and all linked accounts.
  • Update the software regularly: installing the latest firmware version on devices is important to mitigate cybersecurity risks. Each new release fixes bugs found on the software by implementing the latest security patches.
  • Use strong complex passwords of at least six characters and consisting of a combination of numbers, letters and symbols.
  • Conduct regular security audits of the IT infrastructure to identify and eliminate possible vulnerabilities.


To stay up to date on the latest, trends, innovations, people news and company updates within the global security market please register to receive our newsletter here.

Media contact

Rebecca Morpeth Spayne,
Editor, Security Portfolio

Tel: +44 (0) 1622 823 922

Subscribe to our newsletter

Don't miss new updates on your email