xii
Cybersecurity Recommendations
Cybersecurity Recommendations
Mandatory actions to be taken towards cybersecurity
1. Change Passwords and Use Strong Passwords:
The number one reason systems get “hacked” is due to having weak or default passwords.
It is recommended to change default passwords immediately and choose a strong
password whenever possible. A strong password should be made up of at least 8
characters and a combination of special characters, numbers, and upper and lower case
letters.
2. Update Firmware
As is standard procedure in the tech-industry, we recommend keeping NVR, DVR, and IP
camera firmware up-to-date to ensure the system is current with the latest security
patches and fixes.
“Nice to have” recommendations to improve your network security
1. Change Passwords Regularly
Regularly change the credentials to your devices to help ensure that only authorized users
are able to access the system.
2. Change Default HTTP and TCP Ports:
● Change default HTTP and TCP ports for systems. These are the two ports used to
communicate and to view video feeds remotely.
● These ports can be changed to any set of numbers between 1025-65535. Avoiding the
default ports reduces the risk of outsiders being able to guess which ports you are using.
3. Enable HTTPS/SSL:
Set up an SSL Certificate to enable HTTPS. This will encrypt all communication between
your devices and recorder.
4. Enable IP Filter:
Enabling your IP filter will prevent everyone, except those with specified IP addresses,
Summary of Contents for PENDVR-EL8M4K
Page 1: ...PENDVR EL8M4K ELITE SERIES...
Page 19: ...247 2 3 Connection Sample...
Page 127: ...363 restore original status Figure 4 115 Figure 4 116 4 9 1 3 1Upgrade Camera...
Page 150: ...386 Figure 4 137 Figure 4 138...
Page 165: ...401 Figure 4 153 Step 2 Draw the zone 1 Click Draw button to draw a zone See Figure 4 154...
Page 171: ...407 Figure 4 157 Figure 4 158...
Page 172: ...408 Figure 4 159 Figure 4 160...
Page 173: ...409 Figure 4 161 Figure 4 162...
Page 176: ...412 Figure 4 165 Figure 4 166...
Page 177: ...413 Figure 4 167 Figure 4 168...
Page 183: ...419 Figure 4 177 Figure 4 178 4 9 4 1 2 2 Trigger Snapshot...
Page 185: ...421 Figure 4 180 Figure 4 181 4 9 4 1 2 3 Priority...
Page 191: ...427 Figure 4 186 Figure 4 187...
Page 196: ...432 Figure 4 193 Figure 4 194...
Page 282: ...518 Figure 5 69 Figure 5 70...
Page 298: ...534 device Figure 5 86 Figure 5 87...
Page 304: ...540 Figure 5 94 Figure 5 95...
Page 305: ...541 Figure 5 96 Figure 5 97 Please refer to the following sheet for detailed information...
Page 332: ...568 Figure 5 136 Note For admin you can change the email information See Figure 5 137...