{"id":34025,"date":"2019-04-25T19:42:53","date_gmt":"2019-04-26T02:42:53","guid":{"rendered":"https:\/\/www.enxmag.com\/twii\/?p=34025"},"modified":"2019-04-25T19:55:15","modified_gmt":"2019-04-26T02:55:15","slug":"save-your-unprotected-printers-from-dangerous-printer-pranks","status":"publish","type":"post","link":"https:\/\/www.enxmag.com\/twii\/the-week-in-imaging-twii\/editors-blog\/2019\/04\/save-your-unprotected-printers-from-dangerous-printer-pranks\/","title":{"rendered":"Save Your Unprotected Printers from Dangerous Printer Pranks"},"content":{"rendered":"<p dir=\"ltr\">When printers around the world began <a class=\"SWhtmlLink\" href=\"https:\/\/www.theverge.com\/2018\/11\/30\/18119576\/pewdiepie-printer-hack-t-series-youtube\" target=\"_blank\" rel=\"noopener noreferrer\">spewing silly messages<\/a> urging recipients to subscribe to a YouTube channel a few months ago, many considered the incident a joke. But while social media users laughed off the prank, trading stories and photos of their home and office equipment\u2019s absurd printouts, IT pros came to a chilling realization.<\/p>\n<div id=\"attachment_34028\" style=\"width: 154px\" class=\"wp-caption alignleft\"><img aria-describedby=\"caption-attachment-34028\" loading=\"lazy\" class=\"size-full wp-image-34028\" src=\"https:\/\/www.enxmag.com\/twii\/wp-content\/uploads\/2019\/04\/HP_Blue_RGB_72_MD.gif\" alt=\"\" width=\"144\" height=\"144\" srcset=\"https:\/\/www.enxmag.com\/twii\/wp-content\/uploads\/2019\/04\/HP_Blue_RGB_72_MD.gif 144w, https:\/\/www.enxmag.com\/twii\/wp-content\/uploads\/2019\/04\/HP_Blue_RGB_72_MD-150x150.gif 150w\" sizes=\"(max-width: 144px) 100vw, 144px\" \/><p id=\"caption-attachment-34028\" class=\"wp-caption-text\">Sponsored Content<\/p><\/div>\n<p dir=\"ltr\">If someone can hack unprotected printers to deliver unsolicited messages, they can also gain unrestricted access to your sensitive data\u2014and an entry point to your entire network.<\/p>\n<p dir=\"ltr\">In other words, the same vulnerabilities pranksters used to <a class=\"SWhtmlLink\" href=\"https:\/\/www.tektonikamag.com\/index.php\/2018\/12\/14\/protect-your-exposed-printers-before-they-start-spewing-ads\/\" target=\"_blank\" rel=\"noopener noreferrer\">control unprotected printers<\/a> can be exploited by shadier hackers with more nefarious plans. These criminals could cost your company millions in damages and cause massive and lasting destruction across your entire IT environment.<\/p>\n<p dir=\"ltr\">\u201cThe risk of causing <a class=\"SWhtmlLink\" href=\"https:\/\/www.bbc.com\/news\/technology-46552339\" target=\"_blank\" rel=\"noreferrer noopener\">financial damage<\/a>, in this case, is as real as it gets,\u201d says Bob Reny, EMEA CTO and Principal Engineer of security firm ForeScout, in an article for <em>BBC News<\/em>. \u201cAnd all of this because organizations or individuals installed a connected device without really taking the time to audit the implications this has on their existing network security infrastructure.\u201d<\/p>\n<p dir=\"ltr\">Luckily, there\u2019s still plenty you can do to protect your environment from innocuous pranksters, as well as more vicious cybercriminals lurking in the shadows. Here are five ways you can start to eliminate printer vulnerabilities right now:<\/p>\n<p><strong>1. Audit all connected devices<\/strong><\/p>\n<p dir=\"ltr\"><img loading=\"lazy\" class=\"size-medium wp-image-34030 alignright\" src=\"https:\/\/www.enxmag.com\/twii\/wp-content\/uploads\/2019\/04\/HP-graphic-300x188.jpg\" alt=\"\" width=\"300\" height=\"188\" srcset=\"https:\/\/www.enxmag.com\/twii\/wp-content\/uploads\/2019\/04\/HP-graphic-300x188.jpg 300w, https:\/\/www.enxmag.com\/twii\/wp-content\/uploads\/2019\/04\/HP-graphic-768x480.jpg 768w, https:\/\/www.enxmag.com\/twii\/wp-content\/uploads\/2019\/04\/HP-graphic-1024x640.jpg 1024w, https:\/\/www.enxmag.com\/twii\/wp-content\/uploads\/2019\/04\/HP-graphic.jpg 1040w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>Are you 100 percent sure every device connected to your network is configured with the proper security checks? Given the sheer number of devices entering your organization each day, that\u2019s a tough question to answer.<\/p>\n<p dir=\"ltr\">If you haven\u2019t performed a network device audit in a while (or at all), now is the time to do it. Using your preferred network assessment tool, check all connected devices to ensure they\u2019re set up with the proper firewall configurations. Also, if you haven\u2019t already, consider setting up a separate network for guest use. This way, you don\u2019t have to give unauthorized personnel access to your closed, secure network if they need to hop online.<\/p>\n<p><strong>2. Install security patches and updates<\/strong><\/p>\n<p dir=\"ltr\">Never put off installing software and firmware updates. While this is much easier said than done, procrastinating on updates and patches could lead to more painful headaches down the line. After all, it only takes a moment for an opportunistic hacker to find a vulnerability point and siphon your valuable data.<\/p>\n<p dir=\"ltr\">Make sure your team knows the critical importance of staying on top of patches and updates. Reinforcing this as a habit will only benefit your business in the long run, and you won\u2019t end up in the headlines for falling prey to an exploitation of a previously patched security vulnerability.<\/p>\n<p><strong>3. Follow recommended printer security protocols<\/strong><\/p>\n<p dir=\"ltr\">As an IT pro, you know the importance of having complete visibility into the devices connected to your network. Users, however, may plug in and set up their own equipment without realizing they\u2019re exposing the organization to countless dangers. Just one or two unprotected devices could threaten your entire network.<\/p>\n<p class=\"\" dir=\"ltr\">In addition to educating your workforce on the proper protocols when it comes to installing and using devices (like letting IT know immediately if you bring your own device to work), you\u2019ll want to make sure all equipment on the network is programmed with the appropriate device security standards. Printers, for example, should follow these basic security settings:<\/p>\n<ul>\n<li class=\"\">Always set the administrator password<\/li>\n<li class=\"\">Configure your wireless security options<\/li>\n<li class=\"\">Review your embedded web server options (if applicable)<\/li>\n<li class=\"\">Double-check your remote print settings<\/li>\n<li class=\"\">Enable\/disable network options\u2014only enable what your users absolutely need<\/li>\n<\/ul>\n<p>For a more comprehensive list of recommended printer security settings, <a class=\"SWhtmlLink\" href=\"https:\/\/support.hp.com\/us-en\/document\/c03687861\" target=\"_blank\" rel=\"noopener noreferrer\">click here<\/a>.<\/p>\n<p><strong>4. Conduct a secure print analysis<\/strong><\/p>\n<p dir=\"ltr\">Are you sure every printer across your business is adequately protected? Even if you know you and your team follow all printer security protocols and cybersecurity best practices to protect your print environment, it never hurts to double-check, especially with multiple printer pranksters on the loose and wreaking havoc.<\/p>\n<p dir=\"ltr\">This quick (and free) <a class=\"SWhtmlLink\" href=\"https:\/\/www8.hp.com\/us\/en\/solutions\/business-solutions\/printingsolutions\/secureprintanalysis.html#\/\" target=\"_blank\" rel=\"noopener noreferrer\">secure print analysis<\/a> only takes a couple of minutes to fill out and will let you know within minutes how your print security rating compares with 167 other IT managers, and it will provide you a checklist with policy recommendations from the NIST cybersecurity framework. With that in hand, you\u2019ll be able to bite back against the scariest of hackers\u2014without breaking a sweat.<\/p>\n<p><strong>5. Choose devices with embedded security features<\/strong><\/p>\n<p dir=\"ltr\">One of the best ways to protect your environment is to invest in tech that\u2019s pre-equipped with the most sophisticated device security features on the market. <a class=\"SWhtmlLink\" href=\"https:\/\/www8.hp.com\/us\/en\/solutions\/business-solutions.html?jumpid=ba_rx1bkij5ez\" target=\"_blank\" rel=\"noopener noreferrer\">HP printers<\/a>, for example, can detect, protect, and self-heal from malware attacks\u2014all on their own. As you upgrade outdated equipment this year, opt for products you can trust. In particular, you\u2019ll want to look for devices that come with built-in threat detection and software validation features, so only authorized firmware and software can be installed and executed on the machine. You\u2019ll thank yourself later for that extra layer of security.<\/p>\n<p dir=\"ltr\">Printer hacking\u2014even for the sake of delivering seemingly harmless messages or practical jokes\u2014is serious business. Fortunately, for proactive IT leaders like you, there are plenty of tools available to reinforce your print security and protect your organization from pranksters and hardcore cybercriminals alike.<\/p>\n<p dir=\"ltr\"><em>Originally published on <a href=\"http:\/\/www.tektonikamag.com\">www.tektonikamag.com<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>When printers around the world began spewing silly messages urging recipients to subscribe to a YouTube channel a few months ago, many considered the incident a joke. But while social media users laughed off the prank, trading stories and photos of their home and office equipment\u2019s absurd printouts, IT pros came to a chilling realization. If someone can hack unprotected printers to deliver unsolicited messages, they can also gain unrestricted access to your sensitive data\u2014and an entry point to your entire network. In other words, the same vulnerabilities pranksters used to control unprotected printers can be exploited by shadier hackers with more nefarious plans. These criminals could cost your company millions in damages and cause massive and lasting destruction across your entire IT environment. \u201cThe risk of causing financial damage, in this case, is as real as it gets,\u201d says Bob Reny, EMEA CTO and Principal Engineer of security firm ForeScout, in an article for BBC News. \u201cAnd all of this because organizations or individuals installed a connected device without really taking the time to audit the implications this has on their existing network security infrastructure.\u201d Luckily, there\u2019s still plenty you can do to protect your environment from innocuous pranksters, as well as more vicious cybercriminals lurking in the shadows. Here are five ways you can start to eliminate printer vulnerabilities right now: 1. Audit all connected devices Are you 100 percent sure every device connected to your network is configured with the proper security checks? Given the sheer number of devices entering your organization each day, that\u2019s a tough question to answer. If you haven\u2019t performed a network device audit in a while (or at all), now is the time to do it. Using your preferred network assessment tool, check all connected devices to ensure they\u2019re set up with the proper firewall configurations. Also, if you haven\u2019t already, consider setting up a separate network for guest use. This way, you don\u2019t have to give unauthorized personnel access to your closed, secure network if they need to hop online. 2. Install security patches and updates Never put off installing software and firmware updates. While this is much easier said than done, procrastinating on updates and patches could lead to more painful headaches down the line. After all, it only takes a moment for an opportunistic hacker to find a vulnerability point and siphon your valuable data. Make sure your team knows the critical importance of staying on top of patches and updates. Reinforcing this as a habit will only benefit your business in the long run, and you won\u2019t end up in the headlines for falling prey to an exploitation of a previously patched security vulnerability. 3. Follow recommended printer security protocols As an IT pro, you know the importance of having complete visibility into the devices connected to your network. Users, however, may plug in and set up their own equipment without realizing they\u2019re exposing the organization to countless dangers. Just one or two unprotected devices could threaten your entire network. In addition to educating your workforce on the proper protocols when it comes to installing and using devices (like letting IT know immediately if you bring your own device to work), you\u2019ll want to make sure all equipment on the network is programmed with the appropriate device security standards. Printers, for example, should follow these basic security settings: Always set the administrator password Configure your wireless security options Review your embedded web server options (if applicable) Double-check your remote print settings Enable\/disable network options\u2014only enable what your users absolutely need For a more comprehensive list of recommended printer security settings, click here. 4. Conduct a secure print analysis Are you sure every printer across your business is adequately protected? Even if you know you and your team follow all printer security protocols and cybersecurity best practices to protect your print environment, it never hurts to double-check, especially with multiple printer pranksters on the loose and wreaking havoc. This quick (and free) secure print analysis only takes a couple of minutes to fill out and will let you know within minutes how your print security rating compares with 167 other IT managers, and it will provide you a checklist with policy recommendations from the NIST cybersecurity framework. With that in hand, you\u2019ll be able to bite back against the scariest of hackers\u2014without breaking a sweat. 5. Choose devices with embedded security features One of the best ways to protect your environment is to invest in tech that\u2019s pre-equipped with the most sophisticated device security features on the market. HP printers, for example, can detect, protect, and self-heal from malware attacks\u2014all on their own. As you upgrade outdated equipment this year, opt for products you can trust. In particular, you\u2019ll want to look for devices that come with built-in threat detection and software validation features, so only authorized firmware and software can be installed and executed on the machine. You\u2019ll thank yourself later for that extra layer of security. Printer hacking\u2014even for the sake of delivering seemingly harmless messages or practical jokes\u2014is serious business. Fortunately, for proactive IT leaders like you, there are plenty of tools available to reinforce your print security and protect your organization from pranksters and hardcore cybercriminals alike. Originally published on www.tektonikamag.com<\/p>\n","protected":false},"author":66,"featured_media":34030,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[80,1650,82,1638],"tags":[203,3625,3624],"_links":{"self":[{"href":"https:\/\/www.enxmag.com\/twii\/wp-json\/wp\/v2\/posts\/34025"}],"collection":[{"href":"https:\/\/www.enxmag.com\/twii\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.enxmag.com\/twii\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.enxmag.com\/twii\/wp-json\/wp\/v2\/users\/66"}],"replies":[{"embeddable":true,"href":"https:\/\/www.enxmag.com\/twii\/wp-json\/wp\/v2\/comments?post=34025"}],"version-history":[{"count":6,"href":"https:\/\/www.enxmag.com\/twii\/wp-json\/wp\/v2\/posts\/34025\/revisions"}],"predecessor-version":[{"id":34034,"href":"https:\/\/www.enxmag.com\/twii\/wp-json\/wp\/v2\/posts\/34025\/revisions\/34034"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.enxmag.com\/twii\/wp-json\/wp\/v2\/media\/34030"}],"wp:attachment":[{"href":"https:\/\/www.enxmag.com\/twii\/wp-json\/wp\/v2\/media?parent=34025"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.enxmag.com\/twii\/wp-json\/wp\/v2\/categories?post=34025"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.enxmag.com\/twii\/wp-json\/wp\/v2\/tags?post=34025"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}