The importance of securing surveillance footage

CCTV Handbook 2022 Surveillance, Infrastructure


David Odayar, Westcon Southern Africa.

We collect video surveillance footage for a specific purpose, such as monitoring a secure area to ensure there is no theft or to ensure the safety of individuals. The footage itself can be used in criminal investigations, as evidence in court, or for internal disciplinary hearings. This means that the footage cannot have been tampered with and must be pure, raw footage recounting the events under scrutiny.

Additionally, as a business, you should ascribe to a zero-trust approach to all aspects of your security in your organisation. The first step here is having complete visibility of all your devices – and video surveillance footage is just as important here.

Where do security solutions start?

Where you implement and secure video surveillance cameras depends on how and where they are installed. To secure them effectively, you need to understand where all the endpoints and touchpoints for your setup land.

For example, some organisations run these natively, within a closed system, where the data is eventually uploaded to an on-premises data centre. Others plug the system directly into the cloud so that they can perform video analytics. With the rate at which attacks are occurring and the ability of cybercriminals to target these cameras, it’s important to protect all locations.

What does this mean? It means investing in on-premises and cloud firewalls, plugging holes in your network, whether the LAN, Wi-Fi, WAN, data centre, SD-WAN connection, or the interconnectivity to your cloud. In short, your security needs to extend from the edge to the data centre and everywhere in between. That can even start with just changing the passwords on your cameras and upgrading your firmware as good general housekeeping. You also need to select the right security vendors for the different layers of security, for example, selecting both Check Point and Palo Alto for their specialist services as opposed to one or the other.

How difficult is it to secure ‘everything’?

It is generally impossible to have a 100% unbreachable network because the attack surface proliferates. One way to handle it is to use tools, like IoT management solutions, to manage all endpoints in your environment and ensure that they are covered under your security umbrella and that you are rolling out security patches across devices as they are released. A good tip is to opt for scalable security solutions.

There is no single solution for security, therefore, zero trust is a must, but so is access control. Businesses must limit access to sensitive data and resources both internally and externally, which can be done through your security management systems. In addition, physical measures like locking the areas where the footage is collected, access cards, biometric systems and multi-factor authentication should also be used.

Other best practices include complexity elimination by reducing the use of unnecessary or unused software that can result in policy mistakes and regular scanning of digital assets and data centres. Another is network segmentation with tools like Check Point and/or Palo Alto firewalls and micro-segmentation to divide the network into smaller units that are easier to manage.

An IoT management platform is an excellent place to start. It offers a single view of the entire environment, and then because these cameras are still endpoints on your network, firewalls are essential to ensure threat extraction and emulation.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Banking’s AI reckoning
Commercial (Industry) Surveillance Access Control & Identity Management Fire & Safety Perimeter Security, Alarms & Intruder Detection Information Security Asset Management News & Events Integrated Solutions Infrastructure Security Services & Risk Management Education (Industry) Entertainment and Hospitality (Industry) Financial (Industry) Healthcare (Industry) Industrial (Industry) Mining (Industry) Residential Estate (Industry) Retail (Industry) Transport (Industry) Conferences & Events Products & Solutions Associations Videos Training & Education Smart Home Automation Agriculture (Industry) Logistics (Industry) AI & Data Analytics Facilities & Building Management IoT & Automation Power Management
From agentic commerce disputes to quantum-powered risk modelling, SAS experts offer a ‘banker’s dozen,’ 13 industry-defining predictions that will separate institutions that master intelligent banking from those still struggling with the basics.

Read more...
Axis signs CISA Secure by Design pledge
Axis Communications SA News & Events Surveillance Information Security
Axis Communications has signed the United States Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge, signalling the company’s commitment to upholding and transparently communicating the cybersecurity posture of its products.

Read more...
Five key technology trends for the security sector in 2026
Axis Communications SA News & Events Surveillance
Axis Communications examines trends it considers important for 2026, as technology and customer requirements continue to evolve, but the basic security needs of end users remain constant.

Read more...
Securing a South African healthcare network
Surveillance Healthcare (Industry) AI & Data Analytics
VIVOTEK partnered with local integrator Chase Networks and distributor Rectron to deliver a fully integrated security ecosystem, providing PathCare with a centralised view of all facilities, simplifying monitoring of sensitive laboratory areas, and ensuring SOP compliance.

Read more...
AI agent suite for control rooms
Milestone Systems News & Events Surveillance AI & Data Analytics
Visionplatform.ai announced the public launch of its new visionplatform.ai Agent Suite for Milestone XProtect, adding reasoning, context and assisted decision-making on top of existing video analytics and events — without sending video to the cloud.

Read more...
The global state of physical security
Genetec News & Events Infrastructure
Physical security has become a strategic business function, improving IT collaboration and decision-making. Moreover, interest in AI has more than doubled among users, and organisations seek flexibility to deploy workloads on-premises, in the cloud, or hybrid.

Read more...
Proactively enhancing campus safety
Surveillance Products & Solutions
Strengthening security management and proactive alerting have become priorities for schools. To address risks such as expansive campuses, multiple entry points, blind spots, and potential intrusions.

Read more...
Smarter investigations in Security Center SaaS
Genetec Surveillance
Genetec has announced new intelligent automation (IA)-powered investigation capabilities in Security Center SaaS to help operators quickly locate video evidence, understand the context surrounding an event, and close cases in minutes.

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.