Protect and secure your audiovisual heritage

CYBERCRIMINALITY: How to fight against daily attacks and protect my audiovisual heritage?

In April 2015, the Twitter and Facebook accounts, as well as the TV5MONDE website were hacked shortly before 10 p.m. The hackers claimed to be from the Islamic State group and spread their propaganda messages through these channels before the accounts were taken over. It was the first significant cyberattack in France. At that time, large media companies suffered a few daily attacks whereas now they number in the thousands.


This year, the American group Sinclair Broadcast counts up to 20,000 attacks per day. In 2020, it was the M6 ​​group suffered a cyber-attack. The observation: the media are targeted by cybercriminals. It is in this context towards cyber risks that we organized a round table at SATIS 2022 on this subject. Here is our report.


During this meeting, we shared best practices in terms of data accessibility, secure remote work and hybrid-cloud storage.




Media insecurity is mostly caused by human error, cybercriminals, technical problems, or natural disasters. Human negligence being number 1, poor management of your media can constitute a cyberthreat on its own, and can serve as a ricocheting doorway for cybercriminals.


While the market is changing, broadcasters must simultaneously train and educate their users since attacks generally occur because of errors by internal collaborators. Also, freelancers are sometimes overlooked in the training process despite their major role in the supply chain.




It is important to have a data access policy and to identify the levels of rights and define the audiences authorized to view, modify, or delete your media.

Be sure to adapt the level of training and awareness of your teams so that they are aware of the flaws and can act accordingly. The risk is all the greater when you use a hybrid-cloud solution where content can be accessed without restriction. Several tools can be put in place to meet this challenge:

  • Logins (username and password)
  • Watermarks
  • Permission levels
  • The use of a Media Asset Management
  • Or an application developed internally


It is advisable to have a “zero-trust” approach. Don’t trust anyone, internally or externally. A single infection in the supply chain can impact production, service providers and distribution.




Audits provide visibility into who is accessing my content, who is using it, how and when. It is an effective solution to identify a problem or unusual use and solve it more easily.


In summary, to protect against cyberattacks:

  • Install firewalls/antivirus
  • Define conditions for transferring media via the cloud
  • Build a data access policy
  • Set up identification tools
  • Train and sensitize your teams


No script is written. Considering all possibilities remains the key to dealing with cyberattacks.


READ: Mediakwest article



Follow us

    Follow us

      IVORY and its partners will attend SATIS 2022

      IVORY and its partners will attend SATIS 2022

      On November 9 and 10, the French-speaking media, entertainment and audiovisual communication industry will meet at SATIS 2022, at the Docks de Paris.

      IVORY will be present to discuss and support visitors in their digital transformation challenges, in under 3 formats.


      As a key player of the media engineering sector, we select and support new entrants in a complex European market. As part of this function, Codemill, Embrace, iconik and Object Matrix will be exhibiting at SATIS.



      Protect and secure your audiovisual heritage

      Wednesday, November 9 from 10:30 a.m. to 11:30 a.m.

      With ever more contributors, stakeholders, and distribution opportunities, how can you ensure the safety and security of your media throughout their life cycle?


      Effectively reuse and monetize your media catalog

      Wednesday, November 9 from 3:00 p.m. to 4:00 p.m.

      For news, streaming and sports, it has become imperative to access their media in real time. What are the obstacles that remain and what can be the solutions to strengthen their effectiveness?


      AWS, a potential threat for software vendors?

      Thursday, November 10 from 10:30 a.m. to 11:30 a.m.

      Giants, such as Amazon Web Services, place research and development at the heart of their strategy to be ever more innovative. Should we worry about specialized software vendors who deal with very specific business issues?


      Wednesday November 9 from 6:00 p.m.

      The opportunity to meet our team of experts and discuss your challenges.

      All meetings will take place in the conference area, on the 2nd floor –IVORY room.


      By understanding customers, users, and workflows within the media supply chain, Codemill provides enjoyable and efficient solutions to best fit their needs, Accurate.Video and Cantemo. They do this by providing media workflow applications that enable M&E companies to save time and money employees enjoy their workday and tools.

      Stop repetitive work. Embrace designs user-centric systems that simplify complex media workflows to help leading media groups internationally to streamline their operations, empower their best creative talents and enhance the overall quality of their work.

      iconik allows organizations to securely manage and share their media, collaborate on projects, and create the most iconik work ever; whether you’re working alone or as part of a global team.

      Pioneers of object storage and media archives modernization, Object Matrix enables global collaboration, increase operational efficiencies, and empower creativity through deployment of MatrixStore, the on-prem, hybrid and cloud storage platform. It brings operational and financial benefits to customers by securely managing content at every stage of its lifecycle.

      BACK TO


      Follow us

        Follow us