The Recycler
  • Katun web banner December 2022 NEW
  • Biuromax Masthead web banner March 2024
  • G&G Web banner May 2024

Fending off IoT hackers

January 30, 2019

With the revelation from the infamous PewDiePie hackers that copycats could soon be infiltrating IoT devices, KYOCERA’s Aaron Anderson has been offering businesses advice on how to protect their printers.

As Anderson explains, “Since the PewDiePie hacks, the number of vulnerable printers globally dropped by almost 50 percent.” However, the hackers responsible have now issued a warning that copycats could be seeking IoT devices to infiltrate.

The “only response” to such a threat, says Anderson, is “an organisation-wide approach to cyber vigilance”, adding that the hacks revealed that “more needs to be done to prevent potential risks becoming reality.”

“Printers need to be encrypted as a means to safeguard against the loss of personal data,” Anderson continues. “Encryption is one of the key technologies highlighted within GDPR, so it is imperative that data stored on printers be encrypted to limit the impact of a breach. 

The Recycler Live Brussels 2024

“In any organisation, there are multiple entry and exit points from which data can flow and your printer is one of these. Whether the data is in the form of e-documents or traditional paper formats, it is important to have a clear knowledge of the risks and an understanding of what data is being held in the printer. Something businesses can do right now, to save yourself a lot of time and stress later, is conduct a thorough audit of all existing data practices, policies and equipment within their organisation.”

He goes on to explain that KYOCERA has evaluated 10 key areas of printer security weaknesses which businesses ought to evaluate to ensure they are protected. These areas are:

  1. Capture – scanning and copying documents to uncontrolled destinations can breach data protection guidelines
  2. Output tray – documents left on the output tray account for the biggest loss of data
  3. Machine operating system – an unprotected operating system could allow takeover of the machine
  4. Ports and protocols – open and unused ports and protocols represent a risk that can be exploited
  5. Management – without regular device scanning, persistent security holes could be exploited
  6. Network – data can be intercepted across the network link
  7. Cloud connection – connecting to offsite locations may leave you open to data breach
  8. Device storage – content stored in devices could be accessed
  9. The human factor – employees can leave sensitive information on their desk
  10. Operation panel – an unlocked panel can allow users to tamper with settings

Anderson concludes that in this technological era there are both “new risks and improved technological solutions” but “organisations must act now to significantly decrease their risk of falling victim.”

Categories : Around the Industry

Tags : Business Hackers IoT Kyocera Printers Security

  • IR Italiana Web ad January 2021
  • Static Control June 2022 Big & Bold Ad
  • Apex Web Banner April 2024
  • Cartridge Web Banner May 2024
  • Ink Tank Web ad May 2024
  • GM Technology Web Ad March 2024
  • TN Core May 2024 Web advert
  • G&G Big & Bold Web banner January 2024
  • Mito Web advert July 2023
  • Biuromax March 2024 Banner
  • PCL May 2024 web banner
  • Zhono Web ad March 2024
  • HYB Web banner Jan 2024
  • Denner Feb 2024 Web Ad
  • ITP Web ad January 2021
  • Altkin Web ad March 2024
  • CET Web ad December 2023
  • CET Web ad December 2023
  • Altkin Web ad March 2024
  • Zhono Web ad March 2024
  • ITP Web ad January 2021
  • PCL May 2024 web banner
  • HYB Web banner Jan 2024
  • Denner Feb 2024 Web Ad
  • Altkin Web ad March 2024
  • HYB Web banner Jan 2024
  • Denner Feb 2024 Web Ad
  • Zhono Web ad March 2024
  • PCL May 2024 web banner
  • ITP Web ad January 2021
  • CET Web ad December 2023

The Recycler, Wittas House, Two Rivers, Station Lane, Witney, OX28 4BH, United Kingdom | Tel: +44 (0) 1993 899800 | Fax : +44 (0) 1993 226899
©2006-2023 The Recycler - Terms & Conditions - Privacy Policy including cookie use

Web design Dorset | Websites by Mark

The Recycler Subscribe Web ad January 2021
The Recycler Subscribe Web ad January 2021