Hackers Love Your Wireless Printer

Chances are, when you consider the ‘usual suspects’ of access points for hackers, your wireless printer is probably pretty low on that list – if it’s there at all. Most of us usually don’t think about the wireless printer getting breached because it’s not the most-used tool in an average office.

BUT: that’s one of the main reasons hackers DO target them. Cybersecurity for the wireless printer is often overlooked, but just because printers tend to be out of sight, they should not be out of mind until you need to print something, and they jam or run out of ink or toner. They’re certainly not out of the mind of hackers. In fact, unsecured printers and other peripheral devices are classic ways for criminals to gain access to a home network.

Cybernews purposely hacked nearly 28,000 unsecured printers globally just to illustrate this point. With a success rate of 56%. What did they do after it breached the network? They had the printers print out a guide on printer security. Kinda spooky, but that’s what they call a ‘teachable moment.’

It would be wise to wonder just how exposed your network is by way of your printer. The security tips below can help. These tips can enable you to better secure your network, which keeps data on all devices more secure.

  1. Change the Default Login Credentials

Default information, including login credentials, are generally set up by the manufacture when you buy any new network peripheral, like a printer. Manufacturers usually set up this default information to give you a way to easily connect and set up your device. It’s convenient, but you should immediately change that information during set up. Establish your own unique credentials.

Why? Because hackers use a master list of all these manufacturer defaults and simply plug it into an automated script and just try them all until they find one that lets them in. When you change the defaults, make sure you create a strong password.

  1. Update Printer Firmware

This applies to every software, app, or device - not just printers. Keeping firmware updated is vital to maintaining good Cybersecurity for your printer and all other devices. Hardware needs updating just like computers, software, and apps do. Those updates often contain important security patches.

Some updates are in your face when they are required, but firmware updates are not typically as visible as software updates. Software and OS updates usually give you a popup notification. But updates to the drivers and firmware that run printers, aren’t as visible or automatic. Often, you need to seek them out.

You can look for firmware updates in these places:

  • The PC manufacturer’s utility app on a connected device
  • The printer’s information panel
  • The printer manufacturer’s app installed on a PC
  1. Use a Network Firewall

There are a number of excellent reasons why you should already have a network firewall - one of which is that it ensures the monitoring of traffic. It can block suspicious activity to keep hackers out of your network. You should configure the firewall to include watching incoming and outgoing printer traffic. If you have an internal IT Support Department or an outsourced Managed IT Services provider, check with them. If they are worth their salt, the network firewall should be securely in place. If it is not, fire them and start over – IMMEDIATELY!

  1. Create a Guest Network for Your Printer

You can improve security by keeping a less secure device separated from computers and phones. A guest network provides a separate Wi-Fi that runs from the same router you use for your main network. It’s much more difficult for hackers to get from one network to another.

You can still print to your printer from devices on another network. You just need to have things configured correctly to save time.

5. Disable Unused Ports or Services

This is always a must. Printers are IoT (Internet of Things) devices, so you often have many ways to connect. You may not need all the ports or services that come with your printer. These ports are risk areas where hackers could find a way in. Disabling any ports and sharing features that you don’t need reduces the risk of a breach.

  1. Unplug It When Not in Use

In an office environment, this may not be necessary, but most home printers aren’t used as much as work printers. People may only use them once a month or a few times a year. If you’re not using your printer constantly, unplug it when not in use. It’s safer and saves a little energy.

This is absolutely a surefire way to cut off a hacker’s access, because when it’s shut down, no access is available at all.

  1. Adopt and Abide by Cybersecurity Best Practices

Your wireless printer is only one device on your network, whether at home or at the office – and there are usually a few Wi-Fi connected devices in play, like scanners or any IoT devices.

All employees need to be trained in good cyber habits. This keeps the company data more secure, which helps you avoid costly data or identity theft breaches.

For good cyber hygiene, start with these standard best practices:

  • Use strong passwords. Nix the tired and easy-to-crack password (the most common) – ‘123456.’
  • Keep software & firmware on devices updated.
  • Use multi-factor authentication wherever possible.
  • Enable device firewalls & other protections.
  • All devices that should have a good antivirus installed.
  • Never login to an account from a link you receive via email or text.
  • Learn how to identify phishing & get a second opinion before clicking.
  • Get a 3rd party security checkup at least once a year.

Frequently Asked Questions

What is the most secure printer?

If you ask ‘ImageOne’, the manufacturer that produces the most secure printer is HP: “Simply put, they offer the most secure devices currently available on the market. HP also has most office printer security features included right out-of-the-box. So, without lifting a finger or paying an extra penny, your network will be more secure.”  

How do I set up a guest network for my business?

If you have an IT provider in place, just have them do it. If not, ‘HelloTech’ provides step-by-step instructions HERE.

What is Internet of Things in simple words?

In the simplest of terms, the Internet of Things (IoT) describes the network of physical objects (‘things’) that are NOT computers or standard peripherals (monitor, keyboard, & mouse), but are connected to the internet. They are embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the internet. Examples are varied and the list grows every day.

These include A/C systems, security cameras, stoves – and many household and office appliances. They can range from the chip in your German Shepherd to your ‘smart commode’ (yes, they are out there). The pacemaker Grandpa had implanted is part of IoT. So are the sensors in your automobile. If you have a smart litterbox (yes, they are out there too), then Captain Fluffybutt is also (sort of) connected.

What is phishing?

Phishing is the most common attack tactic. They typically come through email messages with an enticement to click on a link or attachment, which then releases malware into the computer and network. The often appear to come from trusted sources: a friend, coworker or even your boss (whose address books have been hacked) or from the U.S. government (especially the IRS) or companies like FedEx.

How secure is your network?

As a longstanding, reputable member of the Charlotte IT Support community, ITFIRM.COM offers a FREE, no-risk network and Cybersecurity assessment. We perform a non-intrusive scan that allows us to deliver a comprehensive report of the state of your system and its vulnerabilities that is yours to keep. There are no strings attached, and you are under no obligation to ever use our Managed IT Services.

The two best defenses are next-generation Cybersecurity to protect your data from theft, and a top-notch Managed Services Provider to ensure continued reliability and defenses against newly emerging threats.

We put our 100% Money Back Guarantee in writing, so there is no risk in trying us out. Because we do not require a ‘hard’ contract, our clients can fire us at any time with 30 days’ notice. We have to be good.

Among the Managed IT services we provide:

IT HelpDesk Service
Onsite IT Support
Cybersecurity
Cloud migration and management
Email migration services
Backup and disaster recovery
VoIP phone systems
IT disposition and recycling
Office moves
White label services (IT to IT)

Planning an Office Move?

Contact ITFIRM.COM today! We have the experience to ensure a seamless transition. After the move, your employees will arrive at the new location to find their IT infrastructure ready and open for business!
For more information on office moves, or to receive your FREE no-risk network and Cybersecurity assessment, just fill out the form on this page or call us at:
704-565-9705