This post is part of a series describing the different aspects to consider when choosing a security camera system.
The quality of the user interface is one of the hardest aspects of a security camera system to quantify or even find any real information on.
All systems will have a phone app to access it. Some can be accessed by connecting a monitor and mouse to the NVR (Network Video Recorder), and some can be accessed through a web browser on a computer. Each interface is a little different on the same system, and every brand is different. Price can be an indicator, but it is not guaranteed. Some expensive systems are harder to use than cheaper ones. It’s all about the quality of software from the manufacturer.
Some of the questions to ask when looking at a security camera system are:
How quick does the video load?
I have used doorbell cameras that have apps that are so slow to load the video that by the time you receive a notification that someone rang the door, tap the notification, the app loads, logs in, launches the video and it starts playing… the person has walked away. It makes me wonder why they even include the ability to talk to the person at the door.
Video loading time is even more critical with a camera watching a driveway. None are going to be instantaneous, especially when you’re not connected to the same network as the camera, but the faster the better.
Do event triggers show screenshots?
Some systems show event triggers as a line on the timeline. This lets you know that something happened, but you have to watch the video of the event to know what happened. Other systems display events as a series of screenshots of the motion. This allows you to quickly see what triggered the motion each time without having to watch the video.
Do push notifications display screen shots?
Some systems send you an alert that simply says “Vehicle Detected on xyz camera.” This is nice, but not incredibly helpful. If you have to check the app every time you get a notification, you will eventually stop checking and could miss something important.
Other systems will say “Vehicle Detected on xyz camera” and include a still image of the vehicle. The system at my house does this and even displays that image on my smart watch. It is very handy to be able to look at my watch and see that the notification was because of a delivery truck. I know my package has arrived and there is nothing urgent happening without ever picking up my phone.
How complicated is it to scan through recorded video?
When something happened that did not trigger the motion, how hard is it to find? I have used systems where there is a timeline displayed and you click on the timeline to start the video and you have to let it play. Usually you can increase the playback speed, which helps. On some systems you can drag the timeline around and the video will immediately display for that time. Kinda like scrubbing on a YouTube video. This is much faster to watch the video and find what you’re looking for.
Switching to a different camera during playback is important too. Some reset the timeline when you switch playback cameras, some continue at the same point in time.
How easy is it to download clips of video?
Once you find the section of video that you’re looking for, if you need to save it, how hard is it to do? If it’s a triggered event, can you simply download the entire event? If it’s not an event, how complicated is it to set the start and stop time of the segment that you want to download?
Conclusion
The answers to all of these questions and more will determine your experience using a security camera system as well as the time required to review video. Like everything, its a balance between price, features, and usability. If your going to install a system that is so complicated to use that you never learn how to use it, then I suggest that you save your money and don’t even install one, or just put up fake cameras.
This post is part of a series describing the different aspects to consider when choosing a security camera system.
What powers the camera? Why does it matter?
Battery Powered cameras are typically referred to as “wire-free” in marketing. They use a battery for a power source and some type of wireless for video. These are simple to install and do not require running any cables to the cameras. The major downside is charging the batteries.
Some wire-free cameras will allow you to leave them on charge constantly. This works well for indoor cameras and outdoor cameras, if they are close to an outlet. Most have solar panels as accessories which works well for outdoor cameras that receive good sunlight. The only other option is to take the camera down, or remove the battery, every couple months to charge it. This can be a hassle depending on how accessible the camera is. Also, you have to remember to charge the cameras prior to going on vacation.
Powered cameras are called typically called “wireless” in marketing. They use some type of wireless signal to transmit the video, but are powered from the wall rather than batteries. This is okay for indoor cameras, but for outdoor cameras, you would need to have an electrician run power to each camera location.
POE (power-over-ethernet) cameras require running an ethernet cable (CAT5e or CAT6) to each camera. This cable provides power to the camera as well as delivering video from the camera to the NVR. These are more difficult to install than wire-free, but are more reliable. There is no battery to charge, and no worries about weak wireless signal.
This post is part of a series describing the different aspects to consider when choosing a security camera system.
How do the cameras connect to the place where they are recorded?
Wireless cameras do not require you to run an ethernet cable to the camera. They can be Wi-Fi or a proprietary wireless. The Wi-Fi cameras connect to your existing Wi-Fi network, while the proprietary wireless camera systems will include a receiver that will connect to your network. These can record on the cloud or locally, depending on the system.
Wireless cameras are limited by the strength of the wireless signal, walls/trees/etc., and interference. Wi-Fi cameras that record constantly will use wireless bandwidth on your network which cause issues with the other things you use your Wi-Fi for, such as video streaming.
Cellular cameras connect to the Internet over the 4G/5G cellular network. They have the advantage of only needing cellular service, not Wi-Fi. There is an additional monthly cost for the cellular data. Most, if not all, cellular cameras are battery powered, therefore they cannot record 24/7. See my “POE vs. Powered vs. Battery Powered” post.
Typically an SD card will be installed in the camera to record motion events. With some systems you can pay to also have the video stored on the cloud. If you choose cloud storage, there will be a monthly fee, and every time something is recorded it will use cellular data. If you only record to the SD card, data will only be used when you are accessing the live or recorded video.
Wired cameras connect to the Network Video Recorder (NVR) with an ethernet cable (CAT5e or CAT6). [The older systems used coaxial cable to record analog video. I do not recommend installing this type of system.] For some systems, the cameras will be wired directly to the NVR, then the NVR will connect to the Internet. On other systems, the cameras and NVR will each connect to your existing network, this allows for a more flexible installation.
This post is part of a series describing the different aspects to consider when choosing a security camera system.
Does the system record every now and then, or all of the time? Why choose one over the other?
Event Based recording only records when something triggers an event. This usually begins with something tripped the motion sensor. Most of these motion sensors are Infrared (IR) detectors, especially on battery powered cameras. They have limited range, around 30ft. or less. These are the same sensors used in motion lights. The recording ends a short time after the motion is no longer detected. If the motion detector was not triggered, no video is recorded.
Constant recording records the video from a camera 24/7. This is important because the view of the camera is much larger than the range of the motion detector. Things happen outside of the detection range, and motion detectors don’t catch everything that is within their range.
Because I have constant recording of my personal cameras, I was able to put together this video of a ghost getting mad a my deck chair. (The wind blew it off of the deck). With Event based recording, the video on the right might have been recorded, the one on the left definitely would not have been.
Chairborne
Both can mark events and send push notifications based on specific events. Nearly every camera system today has some type of “Smart Detection” where it can recognize the presence of vehicles and people (some include animals, etc.) within the video and mark the event with the type of detection.
This post is part of a series describing the different aspects to consider when choosing a security camera system.
Where is your video recorded and who has access to it? To some that is an important question. It should be important to everyone. Is it recorded to your basement, on a server in another state, or maybe even in another country?
Cloud recording is when the video from your system is stored somewhere on the Internet. While this can be convenient and makes for an easy system install, there are several disadvantages to this approach:
You have no control over the video, who has access to it, or where it is.
There have been multiple reports of companies using customer video, without permission, for testing as well as handing your video to police without a warrant.
An Internet connection is required for video recording.
There are monthly fees for storage of the video.
24/7 recording is difficult, of not impossible (depending on your connection), and is expensive.
The amount of recored video is limited to what you pay for EACH month.
Local recording is when the the video is stored at the same location as the cameras (your home or business). Local recording is more complicated to install and has a higher up-front cost, but has many advantages over Cloud recording.
All video is recorded at your property.
You grant access to the video.
Video is recorded with or without an internet connection.
An Internet connection is required for remote viewing.
No monthly storage fees.
24/7 recording is the standard.
The amount of recorded video is only limited by the size of Hard Drive(s) installed in the system.
At Crider Consulting, our goal when designing a system is to be able to record around 30 days of 24/7 video from every camera. We do this because you are not always immediately aware that there was an issue on your property and it may be several weeks before you know that you need to go back and review the video.
Crider Consulting is excited to publicly announce that we design and install Security Camera Systems and Networks for small businesses and homes.
Unfortunately, security cameras are essential these days. Wether you want to catch trespassers and thieves, protect against lawsuits, or simply keep an eye on your property or employees, cameras are the most cost effective solution.
Rockingham county has had a rash of catalytic converter thefts recently. It seems as though nearly every business in the Broadway area has had at least one stolen from their parking lot. The police were recently able to apprehend one of the culprits due in part to the video from a camera system that Crider Consulting installed at a local business.
There are plenty of inexpensive products on the market, but deciding which system is right for your needs, how many cameras you will need, and where to place them can be a daunting task. That’s where Crider Consulting comes in. We will meet with you to determine your requirements, design a complete system, purchase and install it for you.
I personally have had cameras at my home for years. I began with a battery powered wireless system that filled my needs at the time. I quickly became frustrated with ensuring that the batteries were charged, having weak wireless signal, and the cloud only storage of that system. So, I upgraded to a wired, POE (power-over-ethernet) system with local only recording, and remote access. I have been so pleased with this system, that it is the primary brand that I decided to install once I started Crider Consulting.
Crider Consulting can also design and install networks, both wired and wireless (Wi-Fi). With my preferred brand, the same system manages both the network and the cameras. This allows for overlap in components, reducing the cost over separate systems. We also install wireless links between buildings, connecting a shop or garage, etc. to your existing network.
In the coming weeks, I will be posting additional blogs explaining some of the differences in the types of Security Camera Systems:
Step 11. Fully test the system. Now that all of the issues are (hopefully) fixed, the entire system needs to be fully tested.
Test every condition, every input combination. Do not skip anything. It is possible that your “fix” caused other issues, or even that there were more issues than you found the first time around.
If everything is not working properly, start over at step 1 and repair the newly found issues. Take into account that the work that you did could have caused the new problem(s). This could help you find the issue more quickly.
This is the final post in this series. Hopefully it was helpful for you.
Step 10. Repair/Replace faulty device(s). Once you locate a device(s) that is causing a problem, you need to repair or replace it. Which you choose depends on many factors, such as: time available, replacement availability, complexity (or possibility) of repair, cost, etc.
Whichever you choose, in the end, the malfunctioning device needs to become a properly functioning device(s).
Repeat this for each device found to be faulty. It’s a good idea to test that part of the system after fixing the device. Test in the same way that you did to find that the device had an issue.
In the next step, we will test the system as a whole.
Next Posts: Step 10. Repair/Replace faulty device(s). Step 11. Fully test the system.
Step 9. Test the remaining devices. In this step, we will basically repeat all of the steps, just on a smaller scale.
If the device is simple, like a switch or relay, you will run through the steps fast. What is the resistance with the contacts closed? What is the resistance with the contacts open? Do the contacts open and close?
If the device is complicated, like a PLC, circuit board, IC, etc., you will need to treat this item like a new “black box” and go through all of the steps. This is where it can get complicated. You could save a lot of time by “throwing parts at it”… If a spare is available, replace it. If it fixes the problem, you can decide if you will just leave the spare in place, or fix the original. If it doesn’t fix the issue, just put the original back in, and move on the the next item.
If you need to troubleshoot and/or repair an item like a circuit board, the same steps apply, but it is much more difficult and is well beyond the scope of the high-level blog.
Test each device, one at a time, until you find the faulty component(s).
Imagine a world world without passwords. Wouldn’t that be amazing? We didn’t have them back before computers and the internet, and in the future everything will have secure password-less login everywhere, but for now we need them if we are going to use the world wide web.
Why does everything require a username and password?
Can’t I just use the same password for everything?
But why do passwords need to be so complicated?
How am I supposed to remember all of these passwords?
These are questions that everyone has asked at some point. In this post, I plan to answer those questions, and hopefully give you a better understanding of the importance of good passwords and adding additional security measures.
Nothing is unhackable
First, you need to know is that NOTHING is unhackable. Anyone who tells you different is either lying or doesn’t understand how things work. To better understand why, you only need to realize that to stop a hacker, the security needs to be 100% secure 100% of the time. A hacker only needs to be successful once.
That doesn’t even account for Social Engineering. Social Engineering is, basically, tricking someone into giving you the information that you want. Spam emails and phone calls are the most common examples of this. If you can talk someone into giving you access to a computer or bank account, there is no amount of security that can keep them out. If you give a thief the keys to your house, it won’t matter how good your locks are, they’ll still get in.
NEVER give this information to anyone.
The Convenience <—–> Security spectrum
Security and convenience are inversely related. The more security that you have, the less convenient it is to use. This is a simple fact. For example, If you were to put five deadbolts on your front door, your security would increase, but it’s less convenient to lock and unlock five locks. If you key each lock differently, your security would increase even more, and the convenience would decrease yet again by having to use five keys.
You will need to decide where on the spectrum you want to live, and this can be different based on the account. You might be willing to sacrifice more convenience to better secure your financial accounts than you are for facebook. I can’t tell you if this is right or wrong, it’s your choice based on your threat tolerance.
Just remember, the easier it is for you, the easier it is for the bad guys.
Why does everything require a username and password?
Your username distinguishes you from every other user. The password is an attempt to ensure that you are the only one that can log into your account. I say “attempt” because it does not do a very good job of keeping others out who want in bad enough.
Can’t I just use the same password for everything?
Using the same username and password for multiple accounts is the most convenient and least secure method. I consider this basically zero security. Never do this.
Even the best companies eventually get hacked into. Usually when that happens, one of the first things that a hacker looks for is a list of usernames and passwords. Every website is supposed to store passwords as a “hash”, not the password itself, but hashes are able to be converted back into the password (It’s not easy, but is possible), and not everyone hashes passwords.
A password hash is the result of processing the password through a cryptographic function. When you enter your password into a website, it preforms the same cryptographic function on what you entered and compares the output to the stored hash. Hashes are easy to calculate but very difficult to reverse.
If a website that you don’t even use anymore gets hacked and they get your username and password, no big deal right? Who cares about the information on that site? Maybe so, but what if it is the same login that you still use for your bank account? What if one of the many hackers that purchase your login information give it a try on your bank’s website? And what if they transfer all of your money into their own account? Is it still “no big deal?”
But why do passwords need to be so complicated?
Two of the many ways that hackers attempt to gain access to someone’s accounts are “Brute Force” and “Dictionary Attacks.”
With a Dictionary Attack, the hacker will use software to guess the password, using words from a dictionary. Then they will add numbers to the end and replace letters with numbers and special characters. This type of attack can be very fast when the password is not random.
password
Password
password1
password123
pa$$w0rd
pa$$w0rd123
These are some of the first ones in the dictionary. Why? Because they are some of the most commonly used passwords. These, and similar could be cracked in less than a second by this attack.
In a Brute Force attack, a hacker will also use software, but this time they will try every combination of characters in the hope that they will be able to find the correct combination. If successful, they will have access to the account. A long and complicated password will make this harder for them. Imagine how long it would take to brute force the password 123456 vs. B$G+i|KC(u92kG:h0 Which is more secure?
Password length matters as well as its randomness. The random password E9Uwl$ can be cracked within two minutes, while B$G+i|KC(u92kG:h0 could take 317,098 years to crack by brute force.
Below are some examples of random passwords of different lengths to demonstrate how increasing the length of your passwords makes them much harder to crack.
How am I supposed to remember all of these passwords?
Not on a piece of paper. Writing them down is not secure, and tends to make you choose passwords that are easy to write. This makes them less secure. Plus, if someone steals that paper, or takes a picture of it, they have ALL of your logins.
This is where Password Managers come in. They are a safer way to store all your account logins in one place. This database of usernames and passwords is encrypted with a single password to decrypt all of them. With a password manager, you will only need to remember one password.
There are many options out there offering different levels of security and convenience. Some are free, some are paid, and some offer both. A few examples are:
Apple Keychain
Google Password Manager
bitwarden
LastPass
1Password
NordPass
KeePassXC
and many more.
Most will also offer a random password generator which is very helpful in creating quality passwords. Some store your database online for ease of use and access across devices, some store it only on your local hard drive for higher security. They will also have browser plugins which will allow you to easily save a password to the manager when it’s created, as well as to automatically fill in your username and password when you go to a website.
What else can I do to become more secure?
Okay, so I’ve changed all of my passwords to be unique and stored them in a good Password Manager. It was a lot of work, but wasn’t all that hard. Is there anything else that I should do to be even more secure?
If you want to take your security to the next level, you should add Two Factor Authentication (2FA) to all accounts that offer it. There are several types of 2FA.
The overarching term is Multi-Factor Authentication (MFA), when the quantity of factors is two (such as username/password and TOTP), it is typically referred to as 2FA.
e-mail/SMS OTP 2FA
With e-mail or SMS One Time Passcode (OTP) 2FA, when you successfully enter your username and password into a website, it will send you a text message or e-mail with an OTP that you must enter before the login will complete. This is a more secure than not using 2FA, but if your e-mail or cellphone are hacked, the hacker can receive your OTP.
TOTP 2FA
Time-based One Time Passcode (TOTP) is a more secure version of OTP. This used to be done exclusively with hardware tokens, but software is primarily used now. This software will generate an OTP for your specific account that is only valid for a limited time, typically 30 seconds. This code will need to be entered after your username and password before it times out. TOTP is more secure than e-mail/SMS OTP because of the short time it is valid, and the fact that the code is generated on your device and is not sent over e-mail or text message.
Some password managers include TOTP and there are also standalone apps.
Security Key 2FA
Beyond the scope of this post is hardware security keys, such as the yubico YubiKey. The YubiKey offers TOTP as well as password-less login on some sites.
There’s More
This was just a high level overview. There is a lot more information available elsewhere online.