The Recycler
  • https://keypointintelligence.com/communicationsupplies
  • G&G Web Ad Dec 2024
  • Katun Masthead Nov 2024
  • Biuromax Masthead web banner March 2024

Fending off IoT hackers

January 30, 2019

With the revelation from the infamous PewDiePie hackers that copycats could soon be infiltrating IoT devices, KYOCERA’s Aaron Anderson has been offering businesses advice on how to protect their printers.

As Anderson explains, “Since the PewDiePie hacks, the number of vulnerable printers globally dropped by almost 50 percent.” However, the hackers responsible have now issued a warning that copycats could be seeking IoT devices to infiltrate.

The “only response” to such a threat, says Anderson, is “an organisation-wide approach to cyber vigilance”, adding that the hacks revealed that “more needs to be done to prevent potential risks becoming reality.”

“Printers need to be encrypted as a means to safeguard against the loss of personal data,” Anderson continues. “Encryption is one of the key technologies highlighted within GDPR, so it is imperative that data stored on printers be encrypted to limit the impact of a breach. 

“In any organisation, there are multiple entry and exit points from which data can flow and your printer is one of these. Whether the data is in the form of e-documents or traditional paper formats, it is important to have a clear knowledge of the risks and an understanding of what data is being held in the printer. Something businesses can do right now, to save yourself a lot of time and stress later, is conduct a thorough audit of all existing data practices, policies and equipment within their organisation.”

He goes on to explain that KYOCERA has evaluated 10 key areas of printer security weaknesses which businesses ought to evaluate to ensure they are protected. These areas are:

  1. Capture – scanning and copying documents to uncontrolled destinations can breach data protection guidelines
  2. Output tray – documents left on the output tray account for the biggest loss of data
  3. Machine operating system – an unprotected operating system could allow takeover of the machine
  4. Ports and protocols – open and unused ports and protocols represent a risk that can be exploited
  5. Management – without regular device scanning, persistent security holes could be exploited
  6. Network – data can be intercepted across the network link
  7. Cloud connection – connecting to offsite locations may leave you open to data breach
  8. Device storage – content stored in devices could be accessed
  9. The human factor – employees can leave sensitive information on their desk
  10. Operation panel – an unlocked panel can allow users to tamper with settings

Anderson concludes that in this technological era there are both “new risks and improved technological solutions” but “organisations must act now to significantly decrease their risk of falling victim.”

Categories : Around the Industry

Tags : Business Hackers IoT Kyocera Printers Security

  • INk TANK Dec 24 Web Ad
  • IR Italiana Web ad January 2021
  • G&G web advert October 2024
  • Apex Web ad Nov 2024
  • TN Core Dec 2024 Web Ad
  • Cartridge Web Web Ad Dec 24
  • Biuromax Nov 2024 Web Ad
  • Static Control June 2022 Big & Bold Ad
  • HYB Web banner Jan 2024
  • CET Web ad December 2023
  • PCL Nov Web advert
  • Zhono Web ad March 2024
  • Mito Web banner June 2024
  • GM Technology Dec 24 Web Ad
  • denner UK Web Banner Jul 2024
  • Denner Feb 2024 Web Ad
  • Denner Feb 2024 Web Ad
  • Zhono Web ad March 2024
  • HYB Web banner Jan 2024
  • Mito Web banner June 2024
  • denner UK Web Banner Jul 2024
  • PCL Nov Web advert
  • GM Technology Dec 24 Web Ad
  • CET Web ad December 2023
  • Denner Feb 2024 Web Ad
  • denner UK Web Banner Jul 2024
  • Zhono Web ad March 2024
  • HYB Web banner Jan 2024
  • PCL Nov Web advert
  • GM Technology Dec 24 Web Ad
  • Mito Web banner June 2024
  • CET Web ad December 2023

The Recycler, Wittas House, Two Rivers, Station Lane, Witney, OX28 4BH, United Kingdom | Tel: +44 (0) 1993 899800 | Fax : +44 (0) 1993 226899
©2006-2023 The Recycler - Terms & Conditions - Privacy Policy including cookie use

Web design Dorset | Websites by Mark