Minimising the risk of a cyber breach is increasingly important whatever you do. At Inner Range, we’ve recently reviewed all our cyber-related activities as part of a new strategic focus. Our track record is strong: no cyber breaches have been reported in our 30-year-plus history. But we are never complacent and we are now offering specific guidance on how to install our products in the most cyber secure way.
While no system is ever perfectly secure, there are practical steps you can take to make your system much harder to penetrate. In this blog, we cover topline advice for installing our Entry-level intelligent access and security system Inception.
Too many failed login attempts will cause the system to automatically lock out for a period of time, helping to prevent brute force attacks.
In addition, strong passwords and long PINs should be used – these can be configured in the System Settings.
If an administrator rarely requires higher level permissions, consider creating a second account so that if their regular day-to-day account is compromised, the higher-level sections remain protected.
Users accessing the web interface should have 2FA configured. This provides an additional layer of protection if someone’s username and password or PIN are compromised. 2FA can be enforced for all current and future web users via their Web Page Profiles.
Local network security
Ensuring that only users who really need to use the local network to gain access to Inception can do this will help improve cyber security. As will using VPN, Network Segmentation or other similar techniques can ensure the Inception system can only be accessed by specific devices on the customer network.
Beyond this practical measure, securing a local network is vast topic in itself and we recommend working with a network professional to cover this important element.
Remote web access
Disabling remote access over the internet would increase security. But being able to access Inception’s web interface from internet connected devices is a great for convenience.
Manual configuration, such as port forwarding, network and router configurations can help ensure more cyber secure connections.
VPN connections to the network can also improve cyber security by allowing remote connection to Inception but only to authenticated devices. Alternatively, Inner Range’s cloud service SkyTunnel provides a secure connection without the additional network configuration.
Ensuring you run regular firmware updates to the Inception controller and its supporting modules means any cyber fixes to known vulnerabilities will transfer to your system.
Inner Range’s full Inception Cyber Security Hardening Guide is available to download.
For more information about Inner Range’s cyber security measures and award-winning security systems, please contact the sales team on 0845 470 5000 or email@example.com