Thank you for your reply. Sadly, there are no precious metals in this place.
I think that my concerns here are mostly just an extension of working in the IT industry. Any time a device opens a port through a firewall to allow remote access, I naturally would like to learn more about how the manufacturer and software developer are working to ensure that the device and its software as well as the remote access software are properly locked down. Based on the materials that came with it and searches on the net, I was sort of disappointed to find not a lot of info available. My port forwards appear to be working though so that is good. In retrospect I probably should have dug a little further into this before I bought this thing. I can always give their tech support a call too. In the end, I can always just setup VPN and that should help.
Thanks again.