
The threat of ransomware is a reality for broadcasters, whether local or national, radio or TV, individual stations, station groups, or broadcast networks. With several high-profile incidents making the news over the past year, cybersecurity resources for broadcasters are in high demand. A single attack can be extremely expensive, both in terms of lost revenue and the expense involved in restoring/replacing compromised hardware and software.
And with Next Gen TV moving the industry closer to IP delivery, digital content protection takes on even added urgency. Concerns around cybersecurity for broadcast networks and local stations alike are top-of-mind.
While nothing can guarantee 100% protection, there are several things you can do to help reduce the likelihood of an attack. Below is a list of 10 relatively easy - and (mostly) free - things you can do right now to help better protect yourself.
Install Antivirus Software on All Servers
This may seem obvious but it's surprising how often it's overlooked. There is a cost involved in purchasing antivirus software but it's money well-spent. And once the software is installed, be sure you keep it up to date. Any reputable software will issue updates regularly to address newly identified threats - threats you will be susceptible to if you don't install the updates.
Whitelist Network Traffic on Critical Servers
Whitelisting is the process of allowing only network administrator-approved traffic across your network. This could be allowing access between offices for a specific application and trusting only the specific port across which the traffic travels. Alternatively, you could specify that only communication from a specific IP address or range or IPs is allowed.
Backups
Establish a routine for creating regular backups. Real-time backups are ideal, if possible, but if they're not, think about the maximum age you'd want your backup files to be if you went off the air right now. That's how frequently you should be creating backup files. You should also follow the 3-2-1 standard - 3 copies of every backup, stored in 2 locations, at least 1 off-site.
Air Gap Your Backups
This could probably be included under Backups but it's extremely important, so we're mentioning it on its own. Air gapping means making sure at least one copy of an up-to-date backup is stored in a secure location that is offline, completely isolated from both the internet and your internal LAN. A backup file that has no connection cannot be remotely accessed, and therefore cannot be hacked.
Create a Disaster Recovery Plan
Identify your critical applications and create a defined process for restoring them. Having a plan in place before you need one will save you time - and money - should the unthinkable ever happen.
Patch Management
Make sure all systems and software are up to date, running the latest versions, and that all patches and security updates are installed. Keeping everything up to date will help keep you protected as new vulnerability exploits are identified.
Perform Annual or Semi-Annual Penetration Tests and Intrusion Detection Scans
A penetration test is an intentional attempt to actively exploit weaknesses in a system, to determine the ease (or difficulty) a hacker might face trying to do the same. An intrusion detection scan is a test of your system's ability to identify a potential intrusion and appropriately log the event, as well as alert you, when something suspicious is found.
Deploy Single Sign-On and Multi-Factor Authentication
Single sign-on is the process by which employees access multiple systems and applications by signing on once, with a single username and password. This improves security by allowing those credentials to be stored in a single database, rather than in a separate database for each application, each with varying degrees of security. Single sign-on also reduces the risk of lost, stolen, and even just weak passwords.
Multi-factor authentication is a process requiring additional verification factors beyond the typical username and password combination. A common example is a password used in combination with a verification code sent to a mobile device. Multi-factor authentication significantly improves security because access is granted only if the user provides or has access to at least two of the following: something only the user possesses (i.e. an external token generator or mobile phone); something only the user knows (i.e. a password or a PIN); something only the user is (i.e. biometrics such as a fingerprint or iris scan); and/or somewhere the user is (i.e. connected to a specific network or in a specific GPS location).
Implement and Enforce Strict Password Requirements
A strong password is one that is more than 12-14 characters long, contains a combination of numbers, special characters, both upper and lowercase letters, and includes no real words (not even one with a $ substituted for an s). You can avoid an office full of passwords-on-post-it-notes by employing a good password manager.
Train Employees on Cybersecurity
It's important not to overlook one of the most easily exploited vulnerabilities in any organization: your people. All employees, in all roles, should be thoroughly trained on cybersecurity. They should be instructed on how to recognize a phishing email, how to recognize and avoid clicking suspicious links, and the risks associated with writing down passwords, client credit card or bank account numbers, or other sensitive information.
Your staff should also be trained on how to recognize and avoid falling prey to social engineering, tactics such as pretexting (creating a credible but false pretext, either virtually or in-person, to build trust and obtain confidential information), tailgating (following an authorized person through a controlled entrance
North America Stories
02/03/2026
Advanced Systems Group, LLC (ASG), a technology and services provider for media creatives and content owners, has appointed Jody Boatwright as Chief Strategy Of...
02/03/2026
Lightware, an industry leader in signal management, is reinforcing its commitment to simplifying complex AV environments with the continued evolution of its TPN...
02/03/2026
ZEISS Cinema opens its doors to an exclusive screening, filmmakers Q&A and hands-on showcase of the new ZEISS Aatma lens family on Tuesday, March 10, 6:00-9:00 ...
02/03/2026
To expand the creative potential of the compact Astera QuikBeam, DoPchoice introduces the SNAPBAG Round. The new light-shaping accessory transforms the powerfu...
02/03/2026
Douglas Dubler
On a rooftop in New York City, veteran photographer Douglas Dubler watched the sun's angle shift across the urban landscape, his internal cl...
02/03/2026
ZEISS is expanding its Otus ML lens family with the introduction of the new ZEISS Otus ML 1.4/35. This manual-focus lens is designed for photographers who live ...
02/03/2026
Matthews Studio Equipment now offers the new Dinkum Systems White FlexiMount and Phone Mount Kit, a compact, highly adaptable setup for mobile content creation...
28/02/2026
With two features seen in Formula 1 coverage, the broadcaster aims to bring view...
28/02/2026
Secretary of War Pete Hegseth addresses a crowd of approximately 1,500 L3Harris employees in Camden, Arkansas, as part of his Arsenal of Freedom tour....
28/02/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
28/02/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
28/02/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
28/02/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
28/02/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
28/02/2026
Berklee Presents Mambo Mania: Eguie Castrillo and the Berklee All-Stars Big Band...
28/02/2026
Berklee Announces Two New Summer Programs in Los Angeles The Berklee Music Business Program and Electronic Music Production and Sound Design Workshop bring imme...
28/02/2026
AI-RAN is moving from lab to field, showing that a software-defined approach is ...
28/02/2026
Autonomous networks - intelligent, self-managing telecommunications operations -...
28/02/2026
Back to All News
Final Trailer for BEASTARS Final Season Part 2' Roars Tow...
28/02/2026
New way to intentionally discover molecular glues could expand drug discovery Scripps Research scientists and colleagues show how drugs that eliminate certain d...
27/02/2026
The E.W. Scripps Company names Oliver Gray as Vice President, Network Sports and...
27/02/2026
The Gotham Sports App, the exclusive direct-to-consumer streaming home of MSG Networks and the YES Network, is now available for purchase through Prime Video fo...
27/02/2026
ESPN and the Horizon League announce a new multi-year, multi-platform media rights agreement, continuing a 38-year collaboration that began with the 1988 Midwes...
27/02/2026
At the 2026 NAB Show in Las Vegas, NETGEAR will highlight its new switch models and major updates to its Engage Controller software. The company's network d...
27/02/2026
Riedel Communications announces that Fondazione Teatro alla Scala has deployed a...
27/02/2026
Lyuno specializes in media localization, including translation, dubbing, subtitling, and voice-over services for a wide array of entertainment content. The comp...
27/02/2026
Chyron Weather 2.3, the latest edition of Chyron's weather visualization suite for broadcasters and meteorologists, recently launched.
The release includes...
27/02/2026
Telestream, which concentrates in media workflow technologies, announces expanded practical AI enhancements across its Vantage, Vantage Cloud, EDC, Stanza, and ...
27/02/2026
Horizon Sports & Experiences (HS&E), a global sports marketing, media, and live ...
27/02/2026
Legendary sports broadcasters Bob Costas, Doug Collins, Mike Czar of the Telest...
27/02/2026
Beginning on March 1st, IndyCar will be kicking off their 31st season on the str...
27/02/2026
In-venue and creative video staffers at the professional and collegiate level ha...
27/02/2026
Ratings Roundup is a rundown of recent rating news and is derived from press rel...
27/02/2026
Owl AI a pioneer in artificial intelligence for professional sports, announces a...
27/02/2026
With over 447 million fans in APAC, Formula 1 and beIN will continue to innovate...
27/02/2026
12-year-old Noelle Taylor will be the Kid Reporter when the Brooklyn Nets host t...
27/02/2026
Entire CapCam system - including camera unit, RF transmitter, and battery - is h...
27/02/2026
NEW YORK - February 26, 2026 - An estimated 32.6 million people watched President Donald J. Trump deliver the 2026 State of the Union address on Tuesday, Februa...
27/02/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
27/02/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
27/02/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
27/02/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
27/02/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
27/02/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
27/02/2026
Video is one of the lawyer's most powerful storytelling tools in civil litigation today, whether used to transport jurors to an incident scene or challenge ...
27/02/2026
Creative software developer Foundry today released Nuke 17.0, the latest version of its powerful compositing tool for visual effects and animation. Marking one ...
27/02/2026
In a sun-drenched Los Angeles studio filled with guitars, laughter, and the low thrum of KRK monitors, Third Eye Blind's Kryz Reid balances rockstar energy ...
27/02/2026
Atomos announces the launch of Ninja RAW, a 5-inch HDR monitor-recorder designed to give filmmakers, content creators, and broadcasters an uncompromising and af...
27/02/2026
FM, leaders in commercial property insurance, is utilizing Marshall Electronics CV228 Weatherproof Lipstick Cameras to capture critical fire testing data inside...
27/02/2026
Telestream, global leader in media workflow technologies, today announced expanded practical AI enhancements across its Vantage, Vantage Cloud, EDC, Stanza, and...