Home/How Secure is Your Client’s Security?

How Secure is Your Client’s Security?

Redundant, right?  But really, how secure is your client’s office environment?

It wasn’t until the HP Premier Partner event, this summer, that our Service Director and I realized that most, if not all networks out there are vulnerable to a various array of attacks.   You will never guess where most of these attacks can originate?!?

Your client’s printing devices!  Yep, that’s right – that innocent $79 printer that your client Susie just bought and placed on her desk is now an open portal to your network.  Or what about the move to BYOD.  Bring Your Own Device (and don’t forget all the viruses and other “junk” you bring along too)!

We quickly realized after listening to two highly regarded speakers Michael Calce (aka Mafia Boy to the hacking community) and Jason O’Keefe, that no network is immune to attack from these devices that all of us welcome onto our network with open arms.

You see, these devices create “openings” into a network that can be exploited or used as “on ramps” for various attacks to the network and individual users.  Check out the “Wolf” videos from HP on YouTube and you will see just how easy it is to compromise any network…scary stuff!

So, what to do to ensure your client’s office environment is secure?  Well, we have created a quick checklist to help any business batten the hatches, seal the leaks, plug the holes, (you get the idea) and at least make it more difficult for those intent on doing bad things to have a more difficult time doing them!  Here are our top five.  We have additional ones, but as my performance friends always say, leave them wanting more…

  1. Insure there is a router between your client’s network and their ISP (Internet Service Provider).
  2. Change the default password on all routers.
  3. Create and use “specific” IP addresses for your client’s business…never use default IP addresses
  4. Change the default admin password on your client’s copier or printer…and ensure they remember it!
  5. The FTP protocol is normally “ON” when acquiring a new device…always turn it “OFF” if not being used.

Well, there you have it.  I can hear the hacking community groaning just a little since you took these easy steps to secure your client’s technology.  I am in Georgia as I write this for HP Security training and certification, so I am sure I will have more to share next time around.

Until then, be safe!

By |January 20th, 2018|Featured, Uncategorized|

About the Author:

Brian Bence
Brian Bence is the Executive Director of Sales at Shenandoah Valley Office Equipment. SVOE started in 1934 as a typewriter sales and service company and has evolved into a multi-line office technology leader with brands including Samsung, Xerox, Canon, Kyocera, and HP. Brian started out in the office technology industry in 1985 as a Field Service Technician working on 3M and Lanier equipment. Through various companies Brian became a Senior Technician, Lead Technician, and then Service Director over three branches for Ikon Office Solutions. After leaving the industry for several years Brian returned and transitioned into a sales role as an Account Executive for over 12 years and eventually to his current position of Director of Sales. Being able to see both sides of this industry has really helped Brian in providing solutions to customers, working with both sales and service professionals, and truly enjoying all that a technology career has to offer! Brian also enjoys being a Semi-Professional magician in his off-time and enjoys the outdoors in the beautiful Shenandoah Valley of Virginia!

Leave A Comment