
The threat of ransomware is a reality for broadcasters, whether local or national, radio or TV, individual stations, station groups, or broadcast networks. With several high-profile incidents making the news over the past year, cybersecurity resources for broadcasters are in high demand. A single attack can be extremely expensive, both in terms of lost revenue and the expense involved in restoring/replacing compromised hardware and software.
And with Next Gen TV moving the industry closer to IP delivery, digital content protection takes on even added urgency. Concerns around cybersecurity for broadcast networks and local stations alike are top-of-mind.
While nothing can guarantee 100% protection, there are several things you can do to help reduce the likelihood of an attack. Below is a list of 10 relatively easy - and (mostly) free - things you can do right now to help better protect yourself.
Install Antivirus Software on All Servers
This may seem obvious but it's surprising how often it's overlooked. There is a cost involved in purchasing antivirus software but it's money well-spent. And once the software is installed, be sure you keep it up to date. Any reputable software will issue updates regularly to address newly identified threats - threats you will be susceptible to if you don't install the updates.
Whitelist Network Traffic on Critical Servers
Whitelisting is the process of allowing only network administrator-approved traffic across your network. This could be allowing access between offices for a specific application and trusting only the specific port across which the traffic travels. Alternatively, you could specify that only communication from a specific IP address or range or IPs is allowed.
Backups
Establish a routine for creating regular backups. Real-time backups are ideal, if possible, but if they're not, think about the maximum age you'd want your backup files to be if you went off the air right now. That's how frequently you should be creating backup files. You should also follow the 3-2-1 standard - 3 copies of every backup, stored in 2 locations, at least 1 off-site.
Air Gap Your Backups
This could probably be included under Backups but it's extremely important, so we're mentioning it on its own. Air gapping means making sure at least one copy of an up-to-date backup is stored in a secure location that is offline, completely isolated from both the internet and your internal LAN. A backup file that has no connection cannot be remotely accessed, and therefore cannot be hacked.
Create a Disaster Recovery Plan
Identify your critical applications and create a defined process for restoring them. Having a plan in place before you need one will save you time - and money - should the unthinkable ever happen.
Patch Management
Make sure all systems and software are up to date, running the latest versions, and that all patches and security updates are installed. Keeping everything up to date will help keep you protected as new vulnerability exploits are identified.
Perform Annual or Semi-Annual Penetration Tests and Intrusion Detection Scans
A penetration test is an intentional attempt to actively exploit weaknesses in a system, to determine the ease (or difficulty) a hacker might face trying to do the same. An intrusion detection scan is a test of your system's ability to identify a potential intrusion and appropriately log the event, as well as alert you, when something suspicious is found.
Deploy Single Sign-On and Multi-Factor Authentication
Single sign-on is the process by which employees access multiple systems and applications by signing on once, with a single username and password. This improves security by allowing those credentials to be stored in a single database, rather than in a separate database for each application, each with varying degrees of security. Single sign-on also reduces the risk of lost, stolen, and even just weak passwords.
Multi-factor authentication is a process requiring additional verification factors beyond the typical username and password combination. A common example is a password used in combination with a verification code sent to a mobile device. Multi-factor authentication significantly improves security because access is granted only if the user provides or has access to at least two of the following: something only the user possesses (i.e. an external token generator or mobile phone); something only the user knows (i.e. a password or a PIN); something only the user is (i.e. biometrics such as a fingerprint or iris scan); and/or somewhere the user is (i.e. connected to a specific network or in a specific GPS location).
Implement and Enforce Strict Password Requirements
A strong password is one that is more than 12-14 characters long, contains a combination of numbers, special characters, both upper and lowercase letters, and includes no real words (not even one with a $ substituted for an s). You can avoid an office full of passwords-on-post-it-notes by employing a good password manager.
Train Employees on Cybersecurity
It's important not to overlook one of the most easily exploited vulnerabilities in any organization: your people. All employees, in all roles, should be thoroughly trained on cybersecurity. They should be instructed on how to recognize a phishing email, how to recognize and avoid clicking suspicious links, and the risks associated with writing down passwords, client credit card or bank account numbers, or other sensitive information.
Your staff should also be trained on how to recognize and avoid falling prey to social engineering, tactics such as pretexting (creating a credible but false pretext, either virtually or in-person, to build trust and obtain confidential information), tailgating (following an authorized person through a controlled entrance
North America Stories
27/02/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
27/02/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
27/02/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
27/02/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
27/02/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
27/02/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
27/02/2026
Video is one of the lawyer's most powerful storytelling tools in civil litigation today, whether used to transport jurors to an incident scene or challenge ...
27/02/2026
Creative software developer Foundry today released Nuke 17.0, the latest version of its powerful compositing tool for visual effects and animation. Marking one ...
27/02/2026
In a sun-drenched Los Angeles studio filled with guitars, laughter, and the low thrum of KRK monitors, Third Eye Blind's Kryz Reid balances rockstar energy ...
27/02/2026
Atomos announces the launch of Ninja RAW, a 5-inch HDR monitor-recorder designed to give filmmakers, content creators, and broadcasters an uncompromising and af...
27/02/2026
FM, leaders in commercial property insurance, is utilizing Marshall Electronics CV228 Weatherproof Lipstick Cameras to capture critical fire testing data inside...
27/02/2026
Telestream, global leader in media workflow technologies, today announced expanded practical AI enhancements across its Vantage, Vantage Cloud, EDC, Stanza, and...
27/02/2026
Riedel Communications today announced that Fondazione Teatro alla Scala has deployed a comprehensive wireless intercom solution, leveraging Riedel's Bolero,...
26/02/2026
Multi-angle coverage, on-demand access to ultra-high-resolution video are provided for replays and clips across multiple distribution channels
The NHL and Cosm...
26/02/2026
Advanced Systems Group, LLC (ASG), a technology and services provider for media creatives and content owners, has appointed Jody Boatwright as Chief Strategy Of...
26/02/2026
As players report to Spring Training, TikTok and MLB announce an expanded content partnership bringing baseball fans around the world closer to the game through...
26/02/2026
Chyron announces its 2026 Designer of the Year Competition to be awarded during a live stream from the 2026 NAB Show in Las Vegas. This year's competition i...
26/02/2026
Appear, which specializes in live production technology, announces that its X Platform has been officially verified by YouTube for Secure Reliable Transport (SR...
26/02/2026
Adder Technology, a specialist in connectivity solutions and high performance IP...
26/02/2026
Harmonic announces that Alcom, a leading telco operator in Finland, is powering its next-generation white-label headend video service with Harmonic's XOS Ad...
26/02/2026
ESPN, Disney , and the Savannah Bananas announce a 25-game exclusive package in ...
26/02/2026
Brazilian broadcaster Globo has returned as the official broadcast partner of th...
26/02/2026
NDI, which concentrates in plug-and-play IP video connectivity, announces a strategic partnership with Jiaruisen (JRS), a Shenzhen-based technology distributor,...
26/02/2026
The Charleston, SC, native has excelled as a live-camera operator on Tigers broadcasts
In the live-sports-video industry, the future is bright. Our series SVG ...
26/02/2026
Behind The Mic provides a roundup of recent news regarding on-air talent, including new deals, departures, and assignments compiled from press releases and repo...
26/02/2026
Supported by partners, the in-venue production team keeps videoboard-show qualit...
26/02/2026
CAMB.AI provides AI speech synthesis and translation with a focus on localizatio...
26/02/2026
AWS Elemental Inference could help sports broadcasters learn to love AI
This we...
26/02/2026
Industry's only IPMX-compliant audio monitor takes centerstage along with IPMX multiviewers, gateways, converters and routers
Champaign, IL - January 26, 2...
26/02/2026
Cobalt among first manufacturers to achieve verified compliance status with IPMX...
26/02/2026
Barcelona - 20 February 2026 Cobalt Digital, the leading designer and manufacturer of award-winning ST 2110 and SDI signal processing products, and a founding...
26/02/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
26/02/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
26/02/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
26/02/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
26/02/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
26/02/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
26/02/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
26/02/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
26/02/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
26/02/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
26/02/2026
With more than four decades of experience in radio broadcasting and live sports production, Daryl Doss, owner of Doss Technical Services and a contract engineer...
26/02/2026
BCNEXXT has deployed live HLG-based HDR playout capabilities within its Vipe platform, enabling broadcasters to integrate High Dynamic Range into live productio...
26/02/2026
TAG Video Systems (Booth W2323) will unveil new capabilities across its IP-native Realtime Media Platform at NAB 2026. New releases include visual service healt...
26/02/2026
IBC today announced a new strategic partnership with EIT Culture & Creativity the institutional partnership for culture and creativity, supported by the Europ...
26/02/2026
Clear-Com kept the action on track at Red Bull Shay'iMoto, an adrenaline-fueled motorsport spinning event that transformed the streets of Durban, South Afr...
26/02/2026
Harmonic (NASDAQ: HLIT) today announced that Alcom, a leading telco operator in Finland, is powering its next-generation white-label headend video service with ...
26/02/2026
Big Blue Marble, a provider of broadcast-grade, cloud-native video solutions for broadcasters, service providers, and content owners, today announced that it ha...
26/02/2026
New approach enables video service providers to deliver multiple live feeds on the same screen with lower costs and improved device compatibility
Broadpeak, a ...
26/02/2026
Back to All News
Third Season of Love is Blind: Sweden Drops Extra Episodes Fea...