Navigation and service

Smart surveillance camera: How to use the protective device safely

If you choose a smart surveillance camera, you can access live images at any time. Users usually hope for added security or convenience. However, smart surveillance cameras can also pose a security risk. We explain what consumers should look out for to ensure that the camera is not only smart, but also safe.

How does a smart surveillance camera work?

A smart surveillance camera usually generates live image material in high resolution. It establishes a connection to the internet and transmits data to the smartphone, tablet or computer. Networked surveillance cameras can also be connected to other devices, such as a smart door lock.

Where the camera stores data and how it transmits it varies from model to model. Many rely on a cloud from the respective manufacturer. Others use alternatives such as a local, home-based computer system, for example a so-called NAS system (Network Attached Storage). The physical server is then operated by the users themselves. It is usually located at their home instead of in the data centre of the cloud provider.

What are the risks of a smart surveillance camera?

Decisive for the security of a camera is, among other things, which functions it has and how it is operated. If a camera is connected with another device such as a smartphone via the internet, cyber criminals may exploit existing vulnerabilities. Such vulnerabilities may arise, among other things, from incorrect or insecure use, such as setting only weak passwords, or from a lack of data encryption.

Cyber criminals may then succeed in reading out personal data such as the Wi-Fi password. The camera images themselves often also contain sensitive data. Unauthorised persons can intercept them and thus collect a wide range of information about residents, for example about their living habits. If they gain control over the camera itself, they can also, among other things, swivel it according to their wishes or even switch it off. If other smart devices from the smart home, such as the lighting or heating control, are connected to the camera, cyber criminals can also take over or even manipulate them in the next step.

Before buying a smart security camera

Buyers should think carefully about how the device should transfer data and where it should store the data. With cloud storage, for example, the cloud operator takes over the necessary administration and maintenance work. In return, however, he also has control over the stored data. Depending on his location, he may be bound by different legal bases. It is hence worth taking a look at the general terms and conditions as well as at the terms of use.

However, the risk of becoming a victim of cybercrime cannot be completely ruled out with a smart device, regardless of the choice of storage location. Anyone who decides to buy a surveillance camera with an internet connection should therefore find out how security risks can be reduced.

Smart surveillance cameras come in countless models. If the device bears an IT Security Label, you can easily scan the QR code printed on it to get more information. You will then be taken to the corresponding BSI product page. There you will find an easy-to-understand summary of the IT security features of the respective product.

Setting up and operating a smart surveillance camera

Even a camera from a manufacturer that pays attention to cyber security can pose risks: After purchase, it is important that users follow a few tips both when setting up and when continuing to operate the camera.

How to reduce security risks when setting up the camera:

  • Change the default password of the device. Use a strong password that you do not already use for other devices, applications or websites. If available, use two-factor authentication.
  • If you do not need to access the camera while on the road, connect it only to the local home network. You can find out how to create such a network in the operating instructions for your router.
  • If you want to access the camera while you are away from home, set up a network specifically for your IoT (Internet of Things) devices. This will make it more difficult for cyber criminals to use the camera as a gateway to access other devices in the same network, such as your private computer or sensitive home office applications. Here, too, the router's operating instructions will help.
  • Deactivate app permissions that you do not need. This could be access to the microphone or to your location, for example.
  • Select the space visible on the camera section carefully. In this way, you minimise the risk of being spied on in the event of a cyber attack.

How to use your camera as safely as possible:

  • Provide the camera regularly and promptly with security updates from the manufacturer. If possible, activate automatic security updates.
  • Pay attention to connected devices such as smartphones and routers. There, too, you should regularly carry out security updates, activate the firewall and use strong passwords.
  • Be careful when using public Wi-Fi networks, for example at airports or in hotels. If you want to access the camera through a public Wi-Fi network, a VPN connection can help to encrypt data before transmission.
  • Disconnect the camera from the internet when recording and transferring data is not necessary or even not desired.
  • Be wary of phishing emails: In order to obtain the password of the corresponding app, cyber criminals pretend to be cloud operators in emails, for example. Do not disclose private data under any circumstances.