A survey of 1,075 UK workers in full or part-time employment, carried out by technology services provider Probrand.co.uk has revealed that the majority (72%) of companies who suffered a data breach in the last year found that the network infiltration came from unsecured wireless devices, such as a printer, scanner, mobile phone or laptop connected to their Wi-Fi network.
Recent Probrand research found 43% of UK businesses surveyed had reported cyber security breaches or attacks in the last 12 months. Of the surveyed businesses who suffered a breach in the last 12 months, it was found that more than half (52%) had open Wi-Fi networks and or wireless devices.
Furthermore, only 23% of the surveyed employees were aware that infiltration could take place through wireless devices such as printers and scanners.
Only one in ten (10%) of the companies surveyed actively check their printers and scanners for malware as part of their security checks.
Matt Royle, marketing director at Probrand explains: “Every device and connection presents an exploitable entry point. Organisations need to take a ‘zero trust’ approach that assumes all wireless devices connected to the network, and the internet, are inherently insecure unless otherwise tested, protected and monitored.”
He continues: “Cyber-attacks aim to target the weakest point and examples like a wireless webcam, printer or scanner can present an unsecure ‘way in’ to a business’s network. Once in, hackers will exploit the opportunity to make money through whatever means they have at their disposal.”
Royle adds: “The research indicates organisations are not taking this seriously and are running the gauntlet of being hacked via connected devices. This clearly needs to be an area of focus with a look at endpoint security, mobile device management and firewalls amongst other measures to check.”
Probrand is a leading technology services provider, delivering a marketplace that saves users time and money buying IT, and a portfolio of IT services that help businesses be more productive.