Fending off IoT hackers

by | Jan 30, 2019 | 0 comments

With the revelation from the infamous PewDiePie hackers that copycats could soon be infiltrating IoT devices, KYOCERA’s Aaron Anderson has been offering businesses advice on how to protect their printers.

As Anderson explains, “Since the PewDiePie hacks, the number of vulnerable printers globally dropped by almost 50 percent.” However, the hackers responsible have now issued a warning that copycats could be seeking IoT devices to infiltrate.

The “only response” to such a threat, says Anderson, is “an organisation-wide approach to cyber vigilance”, adding that the hacks revealed that “more needs to be done to prevent potential risks becoming reality.”

“Printers need to be encrypted as a means to safeguard against the loss of personal data,” Anderson continues. “Encryption is one of the key technologies highlighted within GDPR, so it is imperative that data stored on printers be encrypted to limit the impact of a breach. 

“In any organisation, there are multiple entry and exit points from which data can flow and your printer is one of these. Whether the data is in the form of e-documents or traditional paper formats, it is important to have a clear knowledge of the risks and an understanding of what data is being held in the printer. Something businesses can do right now, to save yourself a lot of time and stress later, is conduct a thorough audit of all existing data practices, policies and equipment within their organisation.”

He goes on to explain that KYOCERA has evaluated 10 key areas of printer security weaknesses which businesses ought to evaluate to ensure they are protected. These areas are:

  1. Capture – scanning and copying documents to uncontrolled destinations can breach data protection guidelines
  2. Output tray – documents left on the output tray account for the biggest loss of data
  3. Machine operating system – an unprotected operating system could allow takeover of the machine
  4. Ports and protocols – open and unused ports and protocols represent a risk that can be exploited
  5. Management – without regular device scanning, persistent security holes could be exploited
  6. Network – data can be intercepted across the network link
  7. Cloud connection – connecting to offsite locations may leave you open to data breach
  8. Device storage – content stored in devices could be accessed
  9. The human factor – employees can leave sensitive information on their desk
  10. Operation panel – an unlocked panel can allow users to tamper with settings

Anderson concludes that in this technological era there are both “new risks and improved technological solutions” but “organisations must act now to significantly decrease their risk of falling victim.”

Related Posts

MPS Monitor and Nexera join forces

MPS Monitor and Nexera join forces

The two SaaS companies reshape the Managed Print Services software market by integrating remote management and service analytics capabilities under new leadership, Sarah Henderson has been appointed North America Regional Director.

read more

Search The Recycler

Search The Recycler

Static Control June 2022 Big & Bold Ad
HYB Web banner Jan 2024
HYB Web banner Jan 2024
HYB Web banner Jan 2024