It hasn't been a great couple of weeks for cybersecurity in the AV industry. Draper's communication systems
, Logitech's Unifying USB dongles were found to have security flaws
and of course, Zoom's ubiquitous UC software was found to have
a vulnerability that allowed users' webcams to potentially be taken over by a third party. Paul Konikowski explains
what happened in all three cases and talks about how the companies responded (and what lessons were learned). Everyone should read his piece, because it's a matter of time for when (not if) this happens to another.
In the cases of Zoom and Logitech, the flaws were discovered by researchers, not because of an attack. We're lucky every time this is the case (as it was in the case of the wireless presentation device problem
earlier this year), because it's another opportunity to be proactive before there's major damage done to companies and systems, or worse, users. As end users, it's important to discuss cybersecurity with outside AV companies, as well as your in-house team, to make a plan — not just when new systems are put in, but also to maintain existing equipment with firmware/software updates and patches.