Download PDF version Contact company

User friendly video intercom devices are quickly becoming a must-have product for homes and office buildings across the UK. However, some devices could be at risk of remote hacking attacks, leaving consumers vulnerable to cybersecurity breaches.

Today’s intercom devices can easily be connected through a home internet connection, communicating with smartphones and managed simply through a computer, delivering many user benefits including flexibility and convenience.

IP access control systems

But before choosing a device, Tomáš Vystavěl, Chief Product Officer at 2N, a provider of IP access control systems, is urging people to do their research to ensure their preferred device meets high standards of security.  

Vystavěl sets out specific security concerns that may be found in the operating systems of some devices on the market. These vulnerabilities, which could allow hackers to obtain personal passwords or eavesdrop on conversations, include:

  • Flaws in the operating system coding which would enable hackers to gain full access to the intercom device
  • Web security weaknesses that allow an attacker to carry out random operating system (OS) commands on the server that is running an application, thus enabling access to the application and all its data
  • Vulnerabilities in the system that allow a remote attacker to upload a manipulated ringtone file which could enable a complete system takeover
  • Unsecured, non-encrypted communication that allow an attacker to listen in the conversation (man-in-the-middle attack)

Video intercom device

Installing a video intercom device offers users convenience, flexibility and home security"

Tomáš Vystavěl, Chief Product Officer at 2N, said: “Installing a video intercom device offers users convenience, flexibility and home security. There are some great products on the market and I recommend consumers look for excellent security standards as well as a high quality user experience. No one wants to unwittingly give hackers opportunities to access their personal information. Consumers are strongly advised to do their research before choosing a video intercom device.”

To ensure the best user experience Tomáš Vystavěl recommends people consider a number of other factors when choosing a video intercom device such as responsiveness, openness for the interconnection with other systems, reliability and quality of both sound and video images, as well as the quality of the overall product.

Protecting their personal data

2N has just released the new 2N® Indoor View answering unit, the latest product in its portfolio of award-winning answering units. Developed with a focus on protecting customers from cybersecurity threats, the 2N® Indoor View uses 2N’s own operating system to provide users with the highest levels of security and protecting their personal data.

The 2N® Indoor View answering unit is equipped with a 7” colour touchscreen display, providing a detailed view of people at the door from its scratch resistant 4-mm tempered glass panel. Users can easily and quickly display live video from the intercom and see who is at the front door in real-time, or they can replay missed or unanswered calls from unexpected visitors who have left a message.

Download PDF version Download PDF version

In case you missed it

Security predictions 2025: AI, drones, and retail innovations
Security predictions 2025: AI, drones, and retail innovations

With the year 2025 stretched out before us, there are many techniques one could use to predict what will happen in the new year. You might analyse historical data and analyse futur...

2024 was a big year for M&A in the security market
2024 was a big year for M&A in the security market

Big news on the mergers and acquisitions (M&A) front is closing out 2024, a year in which several shifts changed the face of the physical security manufacturer community. Ann...

Anviz Global expands palm vein tech for security
Anviz Global expands palm vein tech for security

The pattern of veins in the hand contains unique information that can be used for identity. Blood flowing through veins in the human body can absorb light waves of specific wavelen...

Quick poll
What is the most significant challenge facing smart building security today?