Your information security strategy includes attention to endpoints and patching, but are you aware of the risks associated with your firmware? Your organization's hardware with programmable read-only software could be an overlooked component of your endpoint security strategy.
The recent surge in DDoS attacks has revealed that various connected devices, including office routers, printers, and security systems, could be a huge target for attackers. At some organizations, these devices are not even considered as an aspect of written endpoint security assessments and risk planning.
Using old office equipment can be a security risk, but implementing the wrong technology or poor implementation technique are just as dangerous. In this blog, you'll discover sources of security risk in new office technology and how to mitigate them.
Mobile security and endpoint security are important, related topics. For more on this topic, we recommend 5 Ways to Reduce Information Security Risk in a Mobile Workplace.