The decades of cybersecurity being left to “the I.T. guy” are now well and truly over. If you install connected AV systems, you are already responsible for part of the network’s security because every device on that network can introduce risk if it is not designed and configured properly.
In the latest episode of the Mastering Connectivity Podcast, hosted by Katye McGregor-Bennett and in collaboration with Kordz, one message came through clearly: AV is now part of the network, and that expands the role of integrators into cybersecurity.
As homes become increasingly computerised and autonomous, the podcast underscores a critical theme: despite rapid and dramatic technological acceleration, integrators have a civic responsibility to keep human connection at the heart of every design, deployment and innovation.
Drawing on perspectives from integration, manufacturing and cybersecurity, the panel unpacks what this shift really means, the opportunity for integrators and how to put it all into practice. Kordz Managing Director James Chen, GlobeWave Integration’s Kyle Steele, and senior cybersecurity educator Jeff Sonnleitner, ultimately land on a shared view: every connected device – no matter how small – plays a role in the security of the system. This means cybersecurity is no longer an “added layer”, it has become fundamental to systems design.
Here are a few of the highlights we learned from our panelists.
AV is now part of the network and that changes everything
Chen sets the stage by making it clear that as technology becomes more connected, AV is no longer a standalone discipline. From control processors and streaming devices to displays and smart appliances, every endpoint now exists on a network, and that network must be intentionally and securely managed.
Yet the panel presents this shift as a strategic opportunity rather than an added burden. By embracing the responsibility for secure integration, thoughtful systems design, and ongoing support, integrators can elevate their role from one-time installer to long-term trusted advisor. Those who ignore that evolution, on the other hand, risk being left behind or held accountable when vulnerabilities are exposed.
Just how real is the cybersecurity risk in AV systems?
Integrators do not need to be working on critical infrastructure for their system to be exposed to cybersecurity risks. If it is connected to the internet, it is visible, and it is vulnerable.
One of the most grounding moments in the discussion comes from Sonnleitner. Drawing on his deep knowledge of real-world monitoring, he explains that even a typical residential network can be scanned hundreds of thousands of times in a single week. These scans are not targeted attacks on high-value targets – just constant, automated probing of random networks looking for a simple weakness they can exploit. Any integrator can see how easily issues could arise here.
This makes cybersecurity risks significant – and interestingly, in many cases, problems are created by simple oversights that can be easily fixed.
Where do most AV system vulnerabilities come from?
Despite growing awareness, the panel identifies a number of common errors where integrators can unintentionally introduce risk. One of the most prevalent is the failure to change default usernames and passwords. Simple login credentials such as “admin/admin” remain widely exploited, and automated bots scanning the web can locate these vulnerabilities in seconds.
Similarly, leaving remote access tools open, enabling unvetted auto-updates, or relying on consumer-grade networking equipment can all compromise system integrity. None of these feel significant in isolation, but together, they create an environment that is easy to probe, access and compromise.
Steele goes on to highlight an often-overlooked vulnerability: user behaviour. Clients frequently share Wi-Fi credentials, introduce new devices without oversight, or install consumer-grade products that bypass an otherwise well-designed network infrastructure. Even a seemingly simple decision, such as connecting a smart TV to Wi-Fi for convenient app access, can inadvertently introduce risk if not properly secured.
Why network design is the foundation of AV cybersecurity
Cybersecurity is often depicted as an outcome of software or settings. In reality, it starts much earlier with how the network is designed. Steele compares network design to building a home – without a solid foundation, everything built on top is put at risk. Professional-grade networking equipment, proper segmentation and thoughtful configuration are therefore essential to ensuring both network security and performance.
Four recommended practices for cybersecurity in AV network design
The panel strongly recommends four important design principles for integrators that support cybersecurity:
- Replace ISP-provided routers with professional-grade solutions
- Segment networks using VLANs to separate devices and traffic types
- Create distinct networks for guests, IoT devices and critical systems
- Implement properly configured firewalls and access controls
Real-world examples underscore the importance of these decisions. Steele recounts a project where system instability was ultimately traced back to improper network configuration and then resolved only after introducing proper segmentation between the wired and wireless devices.
[ For deeper insights into how network capability is evolving, especially with increasing bandwidth demands, list to our podcast on Wi-Fi 7 and cable limitations. ]
The expanding role of the integrator
These design principles reinforce a broader point – good network infrastructure is no longer just about speed and performance. It is also about the stability, scalability and security of the system working as one. These in turn depend on how well the system is understood, handed over and managed over time.
Chen links this to other aspects of homeownership – just as HVAC systems, plumbing and landscaping require regular upkeep, so does connected technology. Establishing clear expectations with clients early is therefore important to long-term performance and mutual satisfaction.
As technology continues to develop and connected systems grow more complex, the role of the integrator is evolving with it. When it comes to cybersecurity, the role is not only about technical expertise during installation, nor does it end at configuration. Cybersecurity is transforming the role of integrators into long-term custodians of the system’s deployment – encompassing additional services including ongoing monitoring, maintenance, updates and client education – a new-generation “I.T. guy”.
Integrators can put this into practice in three key ways:
- Maintaining communication with clients that provides ongoing education and partnership in their systems management
- Service agreements and care plans that not only create recurring revenue opportunities in this new model, importantly, they ensure client systems remain secure, updated and properly supported over time.
- Comprehensive documentation that ensures you avoid problems and risk later. Steele emphasises that every system should include detailed records of network configurations, credentials and device inventories. Without this, even routine servicing can become unnecessarily complex.
Sonnleitner further underscores the importance of education, pointing to initiatives like CEDIA’s upcoming cybersecurity handbook, which equips integrators with practical tools to clearly communicate risks, responsibilities and best practices to their clients.
The impact of AI on AV system security
As the conversation turns toward the future, artificial intelligence emerges as both a powerful tool and a growing concern. Sonnleitner notes that while AI has already transformed the industry in just a few short years, it also accelerates the capabilities of both defenders and attackers. The pace of change is unprecedented, and staying informed is no longer optional.
Steele echoes this sentiment, describing AI as an essential part of his daily workflow. From research and troubleshooting to system design, AI tools are becoming indispensable for integrators looking to stay ahead of evolving threats. Integrators must not only use these tools effectively but also understand their implications for security.
Despite these challenges, the panel agrees that the fundamentals remain unchanged. Strong infrastructure, thoughtful design and disciplined practices continue to form the backbone of secure systems, even as technology evolves.
Summing up how integrators prepare for new cybersecurity expectations today
As the episode concludes, McGregor-Bennett brings the conversation full circle, underscoring the growing importance of cybersecurity as a defining differentiator for integrators. In a world where nearly every home operates on a network, whether the homeowner actively engages with technology or not, the responsibility to secure that environment is no longer optional and increasingly falls within the integrator’s scope.
Yet, with that responsibility comes significant opportunity. By elevating their expertise, embracing cybersecurity as a core competency, and engaging proactively with clients, integrators can move beyond installation to become indispensable partners in the connected home. Approached this way, cybersecurity stops being reactive and becomes part of delivering a system that seamlessly performs as expected.
Key takeaways for integrators
Cybersecurity in AV systems comes down to a few core principles:
- Every connected device increases network exposure
- Most vulnerabilities come from simple configuration oversights
- Network design plays a critical role in system security
- Ongoing support and documentation are part of the job
- Secure systems are the results of deliberate, consistent decisions
Build secure systems from the ground up
Cybersecurity is not something you add at the end of a project. It starts with the decisions you make around network design, infrastructure and connectivity. From cable performance to system reliability, every layer plays a role in how secure and stable the final installation will be. Explore Kordz connectivity solutions to design AV systems that are consistent, robust and ready for the demands of modern connected environments.
Related insights for integrators
For more on the impact of connectivity decisions on network performance and reliability, check out these useful articles:
FAQs
Is cybersecurity really part of the AV integrator’s responsibility now?
Yes. If you are installing connected systems, you are influencing how secure that system is. Every device you deploy sits on a network. How it is configured, how it connects, and how it is maintained all contribute to the overall security of that environment.
What are the most common cybersecurity risks in AV installations?
Most risks are not complex, they come from simple oversights during installation and setup. The most common issues include default credentials left unchanged, unsecured remote access, poorly configured networks, and unmanaged devices being added after installation. These are the first things automated attacks look for, and fortunately they are often the easiest to prevent.
How can integrators improve cybersecurity without becoming specialists?
Start with the fundamentals – focus on good network design, secure configuration and consistent processes. This includes choosing professional-grade connectivity solutions, changing default credentials, segmenting networks, managing access properly and documenting systems clearly. You do not need advanced tools to reduce most risks. In most cases, better discipline in how systems are designed and maintained will have the biggest impact.
A special thanks to our guests and AV Trade Talks host, Katye McGregor Bennett and the team at KMB Communications for their collaboration on this insightful podcast series.
© 2026 Kordz International. All Rights Reserved.
Please note, re-publishing of the contents of this article is prohibited; however, Kordz encourages the link to this page to be shared. If media, distributors, educators or others wish to share this information, we request you author your own post or article and link it to this page on kordz.com.au