It hasn't been a great couple of weeks for cybersecurity in the AV industry.
Draper's communication systems were
ransomwared, Logitech's Unifying USB dongles
were found to have security flaws and of course, Zoom's ubiquitous UC software was
found to have a vulnerability that allowed users' webcams to potentially be taken over by a third party. Paul Konikowski
explains what happened in all three cases and talks about how the companies responded (and what lessons were learned). Everyone should read his piece, because it's a matter of time for when (not if) this happens to another.
In the cases of Zoom and Logitech, the flaws were discovered by researchers, not because of an attack. We're lucky every time this is the case (as it was in the case of the
wireless presentation device problem earlier this year), because it's another opportunity to be proactive before there's major damage done to companies and systems, or worse, users. As end users, it's important to discuss cybersecurity with outside AV companies, as well as your in-house team, to make a plan — not just when new systems are put in, but also to maintain existing equipment with firmware/software updates and patches.