There is no where to hide from cybercrime


Mark Harrison TV-Bay Magazine
Read ezine online

The media sector is an attractive target for cyber attacks of all kinds from malicious individuals who enjoy disrupting high profile shows, to organised criminals who are attracted by the value of content, to nation states aware that media is a way of conveying or distorting messages.

Such attention is hardly surprising, given the pervasiveness of media in contemporary society. But even though many companies appreciate these risks at the global level, they find it difficult to believe they really apply to them. The thinking is that unless you are a big-name brand, you are safe from cyber criminals.

Nowhere is this kind thinking more prevalent than among small and medium sized companies, such as production companies and specialist suppliers. These companies find it tempting to assume cyber criminals are bound to be attracted to the major players: why would they be bothered with a small, bespoke company?

The answer is: because its so easy. Coding is no longer the dark art it once was. These days, you need nothing more than an internet connection and a laptop to access the thousands of videos and websites from which you can learn all the necessary hacking skills. Its not as complex as many people wrongly- assume; something as simple as automated malware, which cruises the internet looking for an open port on a laptop or computer, can result in some of the biggest security breaches.

So, what should smaller companies, who cant afford to employ specialist security staff, do to make themselves less vulnerable?

The first stage is for everyone to understand their responsibility. But this is not as easy as it seems. There's a lack of understanding in this industry about where lines of responsibility lie, says Joel Sloss, Senior Programme Manager for Compliance at Microsoft Azure. The system particularly breaks down when content goes to be modified, or distributed. Theres a mentality that if I am using a major provider, they are taking care of all aspects of security for me, and I dont have to do anything.

But you do, because the accountability is shared with the customer. On top of the providers security foundation, theres all kinds of things that you need to take into account in your environment, such as password security, encryption, access control and rights management.

Naomi Carter, Group Director of Factual Production at Tinopolis recognizes this problem. It's true, she says. We get so focused on making programmes that we just assume that our suppliers are using best practice. Collaborating and working together is going to be absolutely crucial if we are to understand what we dont need to worry about as well as what we absolutely should pay attention to.

And this is where the DPPs new Committed to Security Programme comes in. The Programme provides a means by which all suppliers, big and small, can check they are following best practice, and demonstrate that commitment to others. Meanwhile the DPPs 10 Things You Need to Know About Cyber Security helps Production companies to understand their responsibilities.

No one can hide when it comes to cybercrime. But equally no one should try to hide. The best way to be secure is to share your knowledge and your vulnerabilities with others. It may sound paradoxical, but collaboration makes us stronger.


Tags: iss128 | dpp | cybercrime | microsoft | azure | tinopolis | security | Mark Harrison
Contributing Author Mark Harrison

Read this article in the tv-bay digital magazine
Article Copyright tv-bay limited. All trademarks recognised.
Reproduction of the content strictly prohibited without written consent.

Related Interviews
  • Telestream Vantage support for DPP at IBC 2014

    Telestream Vantage support for DPP at IBC 2014

  • Wohler DPP at BVE 2014

    Wohler DPP at BVE 2014

  • WohlerGateway at IBC 2014

    WohlerGateway at IBC 2014

  • Front Porch Digital at IBC 2014

    Front Porch Digital at IBC 2014

  • Telestream Wirecast and Switch at IBC 2014

    Telestream Wirecast and Switch at IBC 2014

  • Wohler MPEG Monitoring at BVE 2014

    Wohler MPEG Monitoring at BVE 2014

  • NewTek TalkShow at IBC 2014

    NewTek TalkShow at IBC 2014

  • Radiant Grid at NAB 2012

    Radiant Grid at NAB 2012

  • Wowza at NAB 2012

    Wowza at NAB 2012

  • Viaccess-Orca content security at IBC 2015

    Viaccess-Orca content security at IBC 2015

  • Viaccess-Orca at IBC 2016

    Viaccess-Orca at IBC 2016

  • Viaccess-Orca at IBC 2013

    Viaccess-Orca at IBC 2013


Articles
Future proofing post production storage
Josh Goldenhar Advancements in NVMe (Non-Volatile Memory Express), the storage protocol designed for flash, are revolutionising data storage. According to G2M Research, the NVMe market will grow to $60 billion by 2021, with 70 percent of all-flash arrays being based on the protocol by 2020. NVMe, acting like steroids for flash-based storage infrastructures, dynamically and dramatically accelerates data delivery.
Tags: iss135 | nvme | sas | sata | it | storage | post production | Josh Goldenhar
Contributing Author Josh Goldenhar Click to read or download PDF
Test, Measurement and Standards
Alan Wheable The Alliance for IP Media Solutions (AIMS), is a non-profit trade alliance that fosters the adoption of one set of common, ubiquitous, standards-based protocols for interoperability over IP in the media and entertainment, and professional audio/video industries.
Tags: iss135 | omnitek | aims | SNMP | hdr | ai | Alan Wheable
Contributing Author Alan Wheable Click to read or download PDF
Switching to Internet Based Distribution
Chris Clark

"An IP status check for the broadcast industry", "Resistance is futile", "IP points the way forward for the broadcast industry"...

Yes, we've read the headlines too. But rather than force you into submission, scare you, or leave you feeling like you have no other choice, we want to give you the information that helps you to make a sensible decision about Internet-based distribution.

So what’s stopping you from making the switch right now?

Tags: iss135 | ip | internet | distribution | cerberus | Chris Clark
Contributing Author Chris Clark Click to read or download PDF
21st Century Technology for 20th Century Content
James Hall A big challenge facing owners of legacy content is rationalising and archiving their tape and film-based media in cost effective and efficient ways, whilst also adding value. Normally the result of this is to find a low cost means of digitising the content – usually leaving them with a bunch of assets on HDD. But then what? How can content owners have their cake and eat it?
Tags: iss135 | legacy | digitising | digitizing | archive | James Hall
Contributing Author James Hall Click to read or download PDF
The making of The Heist
Tom Hutchings Shine TV has never been one to shy away from a challenge, be that in terms of using new technologies, filming ideas or overall formats: we pride ourselves on being ambitious and risk-takers.
Tags: iss135 | liveu | heist | streaming | cellular | mobile | connectivity | Tom Hutchings
Contributing Author Tom Hutchings Click to read or download PDF