
The threat of ransomware is a reality for broadcasters, whether local or national, radio or TV, individual stations, station groups, or broadcast networks. With several high-profile incidents making the news over the past year, cybersecurity resources for broadcasters are in high demand. A single attack can be extremely expensive, both in terms of lost revenue and the expense involved in restoring/replacing compromised hardware and software.
And with Next Gen TV moving the industry closer to IP delivery, digital content protection takes on even added urgency. Concerns around cybersecurity for broadcast networks and local stations alike are top-of-mind.
While nothing can guarantee 100% protection, there are several things you can do to help reduce the likelihood of an attack. Below is a list of 10 relatively easy - and (mostly) free - things you can do right now to help better protect yourself.
Install Antivirus Software on All Servers
This may seem obvious but it's surprising how often it's overlooked. There is a cost involved in purchasing antivirus software but it's money well-spent. And once the software is installed, be sure you keep it up to date. Any reputable software will issue updates regularly to address newly identified threats - threats you will be susceptible to if you don't install the updates.
Whitelist Network Traffic on Critical Servers
Whitelisting is the process of allowing only network administrator-approved traffic across your network. This could be allowing access between offices for a specific application and trusting only the specific port across which the traffic travels. Alternatively, you could specify that only communication from a specific IP address or range or IPs is allowed.
Backups
Establish a routine for creating regular backups. Real-time backups are ideal, if possible, but if they're not, think about the maximum age you'd want your backup files to be if you went off the air right now. That's how frequently you should be creating backup files. You should also follow the 3-2-1 standard - 3 copies of every backup, stored in 2 locations, at least 1 off-site.
Air Gap Your Backups
This could probably be included under Backups but it's extremely important, so we're mentioning it on its own. Air gapping means making sure at least one copy of an up-to-date backup is stored in a secure location that is offline, completely isolated from both the internet and your internal LAN. A backup file that has no connection cannot be remotely accessed, and therefore cannot be hacked.
Create a Disaster Recovery Plan
Identify your critical applications and create a defined process for restoring them. Having a plan in place before you need one will save you time - and money - should the unthinkable ever happen.
Patch Management
Make sure all systems and software are up to date, running the latest versions, and that all patches and security updates are installed. Keeping everything up to date will help keep you protected as new vulnerability exploits are identified.
Perform Annual or Semi-Annual Penetration Tests and Intrusion Detection Scans
A penetration test is an intentional attempt to actively exploit weaknesses in a system, to determine the ease (or difficulty) a hacker might face trying to do the same. An intrusion detection scan is a test of your system's ability to identify a potential intrusion and appropriately log the event, as well as alert you, when something suspicious is found.
Deploy Single Sign-On and Multi-Factor Authentication
Single sign-on is the process by which employees access multiple systems and applications by signing on once, with a single username and password. This improves security by allowing those credentials to be stored in a single database, rather than in a separate database for each application, each with varying degrees of security. Single sign-on also reduces the risk of lost, stolen, and even just weak passwords.
Multi-factor authentication is a process requiring additional verification factors beyond the typical username and password combination. A common example is a password used in combination with a verification code sent to a mobile device. Multi-factor authentication significantly improves security because access is granted only if the user provides or has access to at least two of the following: something only the user possesses (i.e. an external token generator or mobile phone); something only the user knows (i.e. a password or a PIN); something only the user is (i.e. biometrics such as a fingerprint or iris scan); and/or somewhere the user is (i.e. connected to a specific network or in a specific GPS location).
Implement and Enforce Strict Password Requirements
A strong password is one that is more than 12-14 characters long, contains a combination of numbers, special characters, both upper and lowercase letters, and includes no real words (not even one with a $ substituted for an s). You can avoid an office full of passwords-on-post-it-notes by employing a good password manager.
Train Employees on Cybersecurity
It's important not to overlook one of the most easily exploited vulnerabilities in any organization: your people. All employees, in all roles, should be thoroughly trained on cybersecurity. They should be instructed on how to recognize a phishing email, how to recognize and avoid clicking suspicious links, and the risks associated with writing down passwords, client credit card or bank account numbers, or other sensitive information.
Your staff should also be trained on how to recognize and avoid falling prey to social engineering, tactics such as pretexting (creating a credible but false pretext, either virtually or in-person, to build trust and obtain confidential information), tailgating (following an authorized person through a controlled entrance
North America Stories
29/04/2026
Some people stumble into their passion. Julissa Padilla walked straight into a film vault. For her, entertainment was never just about the movies themselves. It...
29/04/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
29/04/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
29/04/2026
Clear-Com has appointed Brian Grahn as Market Outreach Manager of the Americas and Ben Turnwell as Business Development Manager for EMEA live, expanding their ...
29/04/2026
nxtedition is bringing its range of consolidated production tools to MPTS 2026, with new developments spanning transcription, editing, graphics and AI-assisted ...
29/04/2026
Quortex Switch to boost the streaming experience for Telxius customers, reaching millions of viewers worldwide
Synamedia and Telxius, the leading global connec...
29/04/2026
freispace, the leading ERP-as-a-Service platform for media and entertainment production, and Projective, a leading provider of post-production collaboration tec...
29/04/2026
DHD reports strong interest in its broadcast audio product range, exhibited at the April 19th-22nd NAB Show in Las Vegas. The event attracted a claimed 58,000 a...
29/04/2026
Student Spotlight: Alan Catz The Argentine film and game composer talks about working on League of Legends, receiving Berklee's BMI Award, and the lifelon...
29/04/2026
Jay Jennings Builds the Worlds You Hear on Screen The supervising sound designer behind A Minecraft Movie, The Meg, Letters from Iwo Jima, and dozens of other...
29/04/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
29/04/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
29/04/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
29/04/2026
Back to All News
SUPERNOVA: GENESIS Reached a Peak Audience of More Than 6.5 Mi...
29/04/2026
Jin-Quan Yu elected to the National Academy of Sciences Yu is recognized for his pioneering work in synthetic organic chemistry.
April 28, 2026
LA JOLLA, CA S...
28/04/2026
The audio team for the entertainment event must blend speech intelligibility with full-range music reproduction while considering the broadcast
Last week's...
28/04/2026
The Pac-12 Conference has released an updated primary mark and logo as the starting point of the new league's brand identity. The mark was soft-launched acr...
28/04/2026
The DP World Tour and Amazon Leo have signed an agreement making Amazon's lo...
28/04/2026
Pixellot and HELIOS have announced an integration that automatically converts full-game hockey video into individualized shift videos for each athlete, without ...
28/04/2026
Daktronics has partnered with the Asheville Tourists to manufacture and install a new LED video display. The installation was completed in late 2025 and is now ...
28/04/2026
Eutelsat has announced the renewal of its partnership with PCTV, a content aggregation and distribution company in Mexico and part of Megacable Holdings, for co...
28/04/2026
Daktronics has partnered with the Gary SouthShore RailCats to install a new LED video display at U.S. Steel Yard, replacing the previous Daktronics display inst...
28/04/2026
Telos Alliance and the College Radio Foundation have announced that WWSU-FM of W...
28/04/2026
Golf viewership is growing. The 2025 Ryder Cup drew five million viewers in the UK, a 45% increase over the 2023 event. The US Open was the most streamed golf e...
28/04/2026
The CW Network and WWE, part of TKO Group Holdings (NYSE: TKO), have announced t...
28/04/2026
The Alliance for IP Media Solutions (AIMS) has announced that the Internet Protocol Media Experience (IPMX) suite of standards and specifications has been named...
28/04/2026
The 2026 NAB Show is in the books and the show once again served up a cavalcade ...
28/04/2026
Gray Media and RAJ Sports have announced Rose City SportsNet (RCSN), a new netwo...
28/04/2026
Triton Digital's Podcast Metrics Demos+ Data Integration Enables Comprehensi...
28/04/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
28/04/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
28/04/2026
TAG Video Systems, the leading IP-native Realtime Media Platform, today announced that Lens, its visual service health interface for broadcast operations, recei...
28/04/2026
Open AV-over-IP Standard Recognized in IT Networking/Infrastructure and Security Category
The Alliance for IP Media Solutions (AIMS) today announced that the ...
28/04/2026
VFX History: Slit Scan
Graham Quince April 28, 2026
0 Comments
How did 2001: A Space Odyssey, Star Wars, Doctor Who and Star Trek: The Next Generation...
28/04/2026
These DaVinci Resolve Effects Will Make You a More Creative Colorist
Kasia Jarco April 28, 2026
0 Comments
Creativity in color grading is not about ha...
28/04/2026
A Simple Introduction to Cavalry: Indexed Circle
Simon Ubsdell April 28, 2026
0 Comments
In this new introductory tutorial for Cavalry we're going...
28/04/2026
Rise, the award-winning advocacy group for gender diversity in the broadcast and media technology sector, is pleased to announce a new global training programme...
28/04/2026
Clear-Com has appointed Brian Grahn as Market Outreach Manager of the Americas and Ben Turnwell as Business Development Manager for EMEA live, expanding their ...
28/04/2026
LiveU is inviting MPTS visitors to step into the companys new Q Era on Stand D32, at The Grand Hall, Olympia, London (May 13-14). The company will showcase its ...
28/04/2026
IBC today announces the launch of the IBC2026 Innovation Awards, with nominations now open for projects, programmes and initiatives that exemplify breakthrough ...
28/04/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
28/04/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
28/04/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
28/04/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
28/04/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
28/04/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
28/04/2026
Introducing Nx 3-Strip v2 - A Physics-Based Technicolor Reconstruction for DaVin...
28/04/2026
April 28th, 2026 Press Materials Available Here
TRIBECA FESTIVAL MARKS 25 YEAR...
28/04/2026
LinkedIn Top Companies 2026: Where Career Growth Is Happening Now Published on Apr 28, 2026 Categories: Data and insights
LinkedIn Corporate Communication...
28/04/2026
Editor's note: This post is part of Into the Omniverse, a series focused on how developers, 3D practitioners, and enterprises can transform their workflows ...