McHenry | Chicago | Rosemont | Tinley Park

5 Must-Knows About Connected Devices and Cybersecurity

October 1st marks the start of Cybersecurity Awareness Month. It is co-lead by the Cybersecurity and Infrastructure Security Agency (CISA) and the National Cyber Security Alliance in an effort to raise awareness about the importance of cybersecurity and ensure that everyone has the information and tools they need to be safer online. As a Champion for this program, we’re proud to help support awareness by sharing information and resources that can help to keep our client’s organizations and data secure on our Cybersecurity Awareness Month page. To kick-off the month, we’re starting by getting back to basics and sharing 5 must-knows about connected devices and cybersecurity.

#5 Change the Device’s Default Credentials

Unchanged, default passwords are an easy target for cyber criminals. Take this easy, but essential first step in securing any device by changing the default password. Choose long, complex, and unique passwords that include numbers, letters and symbols. Password managers can also help you to keep track of different device passwords.

#4 Keep the Device’s Firmware Updated

Be sure to monitor when firmware updates are released and apply them to the device. These updates often patch essential security vulnerabilities and if left incomplete, they can be exploited by bad actors. For corporate printer fleets, take advantage of fleet management tools that help you to identify when a printer is out of date and deploy firmware updates quickly and easily. Devices that can no longer be updated should be assessed and refreshed with up-to-date technology.

#3 Extend Security Policies for All Network-Connected Devices

Although traditionally seen as low risk, endpoints like tablets and printers can provide access to your network and data when exploited by cyber attacks. Raise the security expectations for your organization by treating all networked devices as a vulnerability and extend your security policies to all devices.

#2 Deploy Stricter User Access Controls

Not every employee needs access to endpoints like printers or folders that contain sensitive data. Similarly, printers don’t need access to the full network at all times. Use access control tools to fine-tune both employee permissions and printing preferences to limit attack vectors. Take this policy a step further and reduce the amount of time endpoints, like printers, are online by setting the device to shut down during off-hours.

#1 Purchase with Security in Mind

When researching devices, make security one of your must-have procurement requirements. Devices with security features already built in can help to minimize the risk for human error and help to protect your data and network.

 


Security occurs in layers, so it’s important to not only take the essential initial steps to purchase a secure device and apply your organization’s security policies easily by default, but to continue to monitor, assess and re-assess endpoints for threats along your security journey. Contact us today at 800.870.0225 or send us a message if you’re interested in seeing how IMAGETEC can be your partner in securing your network and endpoints.

 

Effective 2024, our business hours will be adjusted to the following: Monday - Friday: 8:00 AM to 4:00 PM