Download PDF version Contact company

User friendly video intercom devices are quickly becoming a must-have product for homes and office buildings across the UK. However, some devices could be at risk of remote hacking attacks, leaving consumers vulnerable to cybersecurity breaches.

Today’s intercom devices can easily be connected through a home internet connection, communicating with smartphones and managed simply through a computer, delivering many user benefits including flexibility and convenience.

IP access control systems

But before choosing a device, Tomáš Vystavěl, Chief Product Officer at 2N, a provider of IP access control systems, is urging people to do their research to ensure their preferred device meets high standards of security.  

Vystavěl sets out specific security concerns that may be found in the operating systems of some devices on the market. These vulnerabilities, which could allow hackers to obtain personal passwords or eavesdrop on conversations, include:

  • Flaws in the operating system coding which would enable hackers to gain full access to the intercom device
  • Web security weaknesses that allow an attacker to carry out random operating system (OS) commands on the server that is running an application, thus enabling access to the application and all its data
  • Vulnerabilities in the system that allow a remote attacker to upload a manipulated ringtone file which could enable a complete system takeover
  • Unsecured, non-encrypted communication that allow an attacker to listen in the conversation (man-in-the-middle attack)

Video intercom device

Installing a video intercom device offers users convenience, flexibility and home security"

Tomáš Vystavěl, Chief Product Officer at 2N, said: “Installing a video intercom device offers users convenience, flexibility and home security. There are some great products on the market and I recommend consumers look for excellent security standards as well as a high quality user experience. No one wants to unwittingly give hackers opportunities to access their personal information. Consumers are strongly advised to do their research before choosing a video intercom device.”

To ensure the best user experience Tomáš Vystavěl recommends people consider a number of other factors when choosing a video intercom device such as responsiveness, openness for the interconnection with other systems, reliability and quality of both sound and video images, as well as the quality of the overall product.

Protecting their personal data

2N has just released the new 2N® Indoor View answering unit, the latest product in its portfolio of award-winning answering units. Developed with a focus on protecting customers from cybersecurity threats, the 2N® Indoor View uses 2N’s own operating system to provide users with the highest levels of security and protecting their personal data.

The 2N® Indoor View answering unit is equipped with a 7” colour touchscreen display, providing a detailed view of people at the door from its scratch resistant 4-mm tempered glass panel. Users can easily and quickly display live video from the intercom and see who is at the front door in real-time, or they can replay missed or unanswered calls from unexpected visitors who have left a message.

Download PDF version Download PDF version

In case you missed it

Global regulations of AI: the role and impact on the physical security industry
Global regulations of AI: the role and impact on the physical security industry

The artificial intelligence revolution in physical security has arrived, transforming how we protect people, assets, and infrastructure. From smart buildings that automatically ad...

How does security innovation impact the skillsets operators need?
How does security innovation impact the skillsets operators need?

Technology automates tasks, streamlines processes, and improves efficiency in various fields, including physical security. But the success of today’s latest technologies depe...

How can manufacturers and integrators mitigate the risks of port forwarding?
How can manufacturers and integrators mitigate the risks of port forwarding?

Port forwarding is a networking technique that allows incoming traffic on a specific port number to be redirected to a particular device or application on a local network. Open por...

Quick poll
What's the primary benefit of integrating access control with video surveillance?