Are Your Wireless Printers Your Achilles Heel?

Everybody should be concerned with someone hacking their computer, but most people usually don’t think about their wireless printer getting breached, perhaps because we don’t print as much as we once did. It’s a tool that most workers use sporadically when they need to print out tax forms or mailing labels.

Although printers tend to be out of sight, they should not be out of mind until you need to print something, or when they jam or run out of ink or toner. They’re certainly not out of the mind of hackers, who are looking at network peripherals, like printers and IoT devices. In fact, unsecured printers and other peripheral devices are a major cybersecurity concern and classic ways for criminals to gain access to a home network.

Cybernews purposely hacked nearly 28,000 unsecured printers globally to illustrate this point. The success rate was 56%. What did it do once it gained access? It made the printers print out a guide on printer security. That’s what they call a ‘teachable moment.’

So, just how exposed your network is with your printers and other peripherals? The security tips below can help. These tips can enable you to better secure your network, which keeps data on all devices more secure.

1: Redo the Default Login Credentials

When you buy almost any new device, it will likely include default information. Manufacturers usually set up default login information, including passwords, to give you a way to quickly connect and set up your device. These are a convenience, but you should immediately change that information during set up.

If your device has a default password, hackers already know it. They use a master list of all these manufacturer defaults and simply plug it into an automated script and just keep trying them all until they find one that lets them in. When you change the defaults, make sure you create a strong password.

2: Keep Your Printer Firmware Updated

This goes for every software, app, or device, not just printers. Keeping firmware updated is vital to keeping your printer and all other devices secure. Hardware needs updating just like computers, software, and apps do. Those updates often contain important security patches.

Usually, firmware updates are not as visible as software updates. Software and OS updates typically give you a popup notification that an update is either due or automatically scheduled. But updates to the drivers and firmware that run printers aren’t as visible or automatic. Often, you need to seek them out.

Here are some of the places you can look for firmware updates are:

  • The printer’s information panel
  • The PC manufacturer’s utility app on a connected device
  • The printer manufacturer’s app installed on a PC

3: Use a Network Firewall

Here at ITFIRM.COM, we shouldn’t even have to tell anybody this obvious fact. You should already have a firewall for a number of reasons - one of which is that a network firewall ensures the monitoring of traffic. It can block suspicious activity to keep hackers out of your network. You should configure the firewall to include watching incoming and outgoing printer traffic.

4: Use a Guest Network for Your Printer

Guest networks provide a separate Wi-Fi even though it runs from the same router you use for your main network. It’s much more difficult for hackers to get from one network to another.

Improve security by keeping a less secure device separated from your main computers and phones. You can still print to your printer from devices on another network. You just need to have things configured correctly to save time.

5: Disable All Unused Ports or Services

Printers are IoT (Internet of Things) devices, so you often have many ways to connect. You may not need all the ports or services that come with your printer. These ports are risk areas where hackers could find a way in. Disabling any ports and sharing features that you don’t need reduces the risk of a breach.

6: Unplug It When Not in Use

This sounds like an extra hassle you don’t need, and it may not be necessary in an office environment, but most home printers aren’t used as much as work printers. People may only use them once a month or a few times a year. If you’re not using your printer constantly, unplug it when not in use. It’s safer and saves a little energy.

Having a device that’s unplugged and unconnected is a surefire way to cut off a hacker’s access, because when it’s shut down, no access is available at all.

7: Adopt Cybersecurity Best Practices

A wireless printer is just one device on your network, whether at home or at the office – and there are usually a few Wi-Fi connected devices in play, like scanners or other IoT devices.

Your employees need to know and adopt good cyber habits. This keeps the company data more secure, which helps you avoid costly data or identity theft breaches.

Some standard best practices to follow for good cyber hygiene are:

  • Use strong passwords (NOT ‘123456!’)
  • Keep software & firmware on devices updated.
  • Use multi-factor authentication wherever possible.
  • Enable device firewalls & other protections.
  • All devices that should have a good antivirus installed.
  • Never login to an account from a link you receive via email or text.
  • Learn how to identify phishing & get a second opinion before clicking.
  • Get a 3rd party security checkup at least once a year.

Frequently Asked Questions

How do I set up a guest network for my business?

If you have an IT Services firm or department in place, just have them do it. If not, ‘HelloTech’ provides step-by-step instructions HERE.

What is the most secure printer?

‘ImageOne’ advises that the manufacturer that produces the most secure printer is HP: “Simply put, they offer the most secure devices currently available on the market. HP also has most office printer security features included right out-of-the-box. So, without lifting a finger or paying an extra penny, your network will be more secure.”  

What is Internet of Things in simple words?

Basically, the Internet of Things (IoT) describes the network of physical objects (‘things’) that are NOT computers or immediate peripherals like your mouse and keyboard but are connected to the internet. They are embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the internet. Examples are varied and the list grows every day.

IoT devices include lights, locks, A/C systems, security cameras, stoves – and many household and office appliances. They can range from the chip in your German Shepherd to your ‘smart commode’ (yes, they are out there). The pacemaker Grandpa had implanted is part of IoT. So are the sensors in your automobile. If you have a smart litterbox (yes, they are out there too), then Admiral Fluffy is also (sort of) connected.

What is phishing?

Phishing is the undisputed #1 method of cyber-attack. They predominantly come through email messages with an enticement to click on a link or attachment, which then releases malware into the computer and network. They often appear to come from trusted sources: a friend, coworker or even your boss (whose address books have been hacked) or from the U.S. government (especially the IRS) or companies like FedEx.

How secure is your network?

As a longstanding, reputable member of the Charlotte IT Support community, ITFIRM.COM offers a FREE, no-risk network and security assessment. We perform a non-intrusive scan that allows us to deliver a comprehensive report of the state of your system and its vulnerabilities that is yours to keep. There are no strings attached, and you are under no obligation to ever use our Managed IT Services.

 

The two best defenses are next-generation network cybersecurity to protect your data from theft, and a top-notch Managed Services Provider (MSP) to ensure continued reliability and defenses against newly emerging threats.

We put our 100% Money Back Guarantee in writing, so there is no risk in trying us out. Because we do not require a ‘hard’ contract, our clients can fire us at any time with 30 days’ notice. We have to be good.

Among the Managed IT services we provide:

IT HelpDesk Service
Onsite IT Support
Cybersecurity
Cloud migration and management
Email migration services
Backup and disaster recovery
VoIP phone systems
IT disposition and recycling
Office moves
White label services (IT to IT)

Planning an Office Move?

Contact ITFIRM.COM today! We have the experience to ensure a seamless transition. After the office move, your employees will arrive at the new location to find their IT infrastructure ready and open for business!

For more information on office moves or to receive your FREE no-risk network and security assessment, just fill out the form on this page or call us at: 
704-565-9705