Printers, Copiers And Other Unexpected Vulnerabilities - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Mobile // Mobile Applications
Commentary
6/22/2010
10:40 AM
Keith Ferrell
Keith Ferrell
Commentary
50%
50%

Printers, Copiers And Other Unexpected Vulnerabilities

When's the last time you updated and patched your printer's firmware -- if you ever have. Yet networked printers, copiers and other common workplace devices, including UPS backups and security cameras, can contain vulnerabilities that can put your business at risk.

When's the last time you updated and patched your printer's firmware -- if you ever have. Yet networked printers, copiers and other common workplace devices, including UPS backups and security cameras, can contain vulnerabilities that can put your business at risk.When's the last time you updated and patched your printer's firmware -- if you ever have. Yet networked printers, copiers and other common workplace devices, including UPS backups and security cameras, can contain vulnerabilities that can put your business at risk.

It's all too easy to overlook business support devices -- printers, fax machines, copiers and so on -- when assessing your business's vulnerability profile.

But in the course of a recent piece on vulnerabilities hiding in plain sight that I did for Dark Reading, I had it pointed out to me again and again just how dangerous an oversight that can be.

The chief culprits:

  • Any networked device that doesn't have thorough and up-to-date security procedures and tools in place.
  • Devices that contain hard disks and other storage capability, in which persistent copies of sensitive information can reside, ready to be viewed or stolen
  • Default passwords left in-place on business equipment; some devices have "hidden" default passwords for service technicians
  • Unexpected vulnerability sources such as TCP/IP connected security cameras or networked UPS backup power supplies

Add to those the old familiar workplace vulnerabilities such as personnel badges and swipe cards left on desks, unsecured paper notebooks containing passwords, log-ins and access codes as well as generally unsafe computing practices by ostensibly "tech-sophisticated" workers and you have a pretty good array vulnerabilities that you may have never considered before.

That oversight is itself a vulnerability -- one that it's time to eliminate.

Even a brief walk-through of your workplace with both your eyes and your mind open can reveal vulnerabilities that need to be fixed. (Here's another one to look for: Ask your employees to turn over their keyboards. Odds are you'll find at least one password taped to the bottom of a supposedly secure worker's keyboard.)

When assessing your company's vulnerabilities, be sure to address -- and repair -- all of them.

Don't Miss: Printer Security? Yep: Printer Security!

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
InformationWeek Is Getting an Upgrade!

Find out more about our plans to improve the look, functionality, and performance of the InformationWeek site in the coming months.

Commentary
New Storage Trends Promise to Help Enterprises Handle a Data Avalanche
John Edwards, Technology Journalist & Author,  4/1/2021
Slideshows
11 Things IT Professionals Wish They Knew Earlier in Their Careers
Lisa Morgan, Freelance Writer,  4/6/2021
Commentary
How to Submit a Column to InformationWeek
InformationWeek Staff 4/9/2021
White Papers
Register for InformationWeek Newsletters
Video
Current Issue
Successful Strategies for Digital Transformation
Download this report to learn about the latest technologies and best practices or ensuring a successful transition from outdated business transformation tactics.
Slideshows
Flash Poll