Everyone is aware of the threat that hackers pose. In this digital age, it makes sense that criminals are working over the internet to break into private networks and steal data and control. Naturally, hackers tend to target the weakest link in a network to break in; however, what most commonly ends up being that weak link tends to surprise people. Printers are one of the most frequently overlooked parts of a network regarding cyber-security. A common misconception is that printers are not 'smart' like computers, essentially rendering them unhackable. However, that is, well, a misconception! While outside forces scheduling unwanted print jobs may only seem like a minor annoyance, printers can store sensitive data, meaning they can serve as a foothold to break into any other device connected to it. For your network to be protected, your printer has to be protected as well.
The convenience and efficiencies that the rise of mobile devices has brought about are indisputable. However, despite the increase in mobile device reliance, their security has not kept the same pace of improvement. Contrary to what many people think, mobile devices are just as susceptible to malware as any other computer or smart device connected to a network. Many of the same cyber-security practices that you should use for computers are the same practices that you should use for your mobile devices.
The first tip is the most obvious one, enable authentication on your device. Every device, mobile or not, that you keep private or sensitive data on should be protected with some form of authentication to restrict access to only those who are approved. This is usually a password or PIN that must be entered to get past the lock screen, but some devices allow for methods such as facial or fingerprint scans.
October is National Cybersecurity Awareness Month. We here at Lighthouse IT Solutions will once again be joining to raise awareness of digital threats and offer knowledge on how to protect yourself from said threats. So the best way to start doing that is to go through the common cyber-security threats!
One of the most common methods hackers employ in breaching networks and stealing secure information is phishing attacks, which is when they disguise their malicious websites or emails as legitimate ones. We have discussed phishing before and will again in more detail next week.
The Lighthouse IT Podcast - September 24th, 2021