Experts seem to agree on these top cyber-security threats for 2016. Take a look at these three potential dangers and how to ensure you are protected.
Many printers are classified as a “small business.” Unfortunately, small businesses will be primary candidates for cyber-attacks in 2016. Why? Because, in some cases, they just simply do not have the expertise and the cyber-defenses in place to protect themselves 365 days a year, 24 hours a day. Larger corporations have already been through a “trial by fire” and have adapted to this changing landscape. Small businesses, on the other hand, have never seen themselves as a target. As a result, hackers are able to easily target these companies.
What can you do? You can take steps to harden your plant. The first step is to use a Next-Generation FireWall (NGFW) to help with the following:
Smartphones have become more and more popular over the years. The use of smartphones in a print shop is undeniable. You can bet that virtually every employee, vendor and/or customer that comes into your plant has one and will use your Wi-Fi to get access to the internet. But how many invest in mobile security? How many actually access or store sensitive data on their smartphone?
If you look back to the early days of the personal computer, people had to learn to use anti-virus/anti-spyware software, firewalls, software updates, etc. You can expect that same evolution to now occur with smartphones. Consider the following tips:
As a business, consider providing separate Wi-Fi for guests and establish a BYOD (Bring Your Own Device) policy for employees.
Internet of Things (IoT)
The Internet of Things (IoT) refers to the proliferation of internet access into everyday devices like air conditioners, thermostats, security cameras, televisions, refrigerators and more. Internet access into a wide variety of devices comes with the inherent risk that many will not have the security you are used to on your workstations and servers.
This type of security will happen over time but before it does, access will be wide open or have different levels of security with various ways to configure them. An early strategy for protection is to put those devices on a separate network that is not connected to your production network. To help this need, vendors have recently started offering IoT gateways designed specifically for this type of protection.
Ask Heidelberg for Help
For further support with these potential threats, take a look at some of our white papers on the topic or consider a few of our available business consulting services.
Senior Technical Support Specialist