Tag Archive for Risk

Secure Your Printer: Protect Personal Data from Hackers

Secure Your Printer: Protect Personal Data from HackersDid you know your printer could be a gateway for hackers to access your data? I have been writing about safeguarding personal data since 2005. By now, everyone should know how to protect personal data on computers and phones—meticulously encrypting emails, using passkeys, and regularly updating software. Despite the hard work, one vulnerability often gets overlooked: the printer. Figuring out how to dispose of a printer safely can make or break online security.

New revelations about certain printers recently highlighted the unforeseen security risks lurking in our offices and homes.  However, with the following tech tips from cybersecurity experts, you can combat the unexpected threat found in many printers and fortify your data against hackers.

Why Printers Pose a Security Risk

Any digital device that connects to Wi-Fi, including printers, stores data about the network on its hard drive.  This is usually beneficial since it allows the printer to automatically connect to the network without requiring you to re-enter the information every time. However, Chris Pierson, CEO of the cybersecurity company BlackCloak, warns that when you sell or recycle a printer, you should delete this saved data by performing a memory wipe or factory reset. The reset prevents cybercriminals from discovering and exploiting the information on the printer.

There’s just one problem: Canon has announced a security flaw in several printers. The security flaw leaves behind the stored Wi-Fi information even after the reset process.  If a hacker gains access to the printer after you sell it or throw it away, they could find these wireless settings simply by going to the Wi-Fi option in the main menu.  Canon reports that this issue affects several printer models, including the E, G, GX, iB, iP, MB, MG, MX, PRO, TR, TS, and XK series.

What information is at risk?

Printers store data about the network on it's hard drive.Data about your wireless settings—including your Wi-Fi name, Internet Protocol address, and network password—could all stick around even after resetting your Canon printer.  Once hackers find that information through the menu commands, they could easily log in to the Wi-Fi network and spy on your online activity, including sensitive information like your bank account login, credit card numbers, and personal photos.

Is this a problem with all printers?

BlackCloak CEO Pierson says the current notice is specific to Canon’s printers and “serves as a reminder [of the risks] to everyone with any electronic device that connects to a … network.” That includes other Wi-Fi connected printers and smart devices like Ring doorbells, refrigerators, dryers, and light bulbs.

You might be surprised by all the devices in your house that access and store your Wi-Fi settings—and consequently might leave your data vulnerable.  “Wi-Fi-connected devices have proliferated, and [they include] things that we may not think of,” says Alex Hamerstone, a director at security consulting firm TrustedSec.  “A lot of low-priced consumer electronics from previously unknown manufacturers have Wi-Fi access now, and I would be more worried about those.”

Steps to Safely Dispose of Printers

Before you throw away, donate, or even send your printer in for repair, you should always perform a factory reset to erase all stored informationThe specific steps for a factory reset will vary depending on your printer model.  Still, the reset function resides under the “General” or “Setup” setting in the main menu.

Canon printers

For Canon printers, follow these steps for a factory reset:

  1. Canon printersGo to the Setup option in the main menu.
  2. Select Device settings > OK, then select Reset settings > OK.
  3. Find Reset, then choose OK.
  4. Select Yes to restore the printer to factory settings.

In addition, users with one of the affected Canon printers must follow these additional steps to remove their Wi-Fi data.

  1. In the menu, go to Reset Settings> Reset All.
  2. Enable the wireless LAN.
  3. Follow the first step again: Reset settings > Reset all.

If you have a Canon printer model that does not have the “Reset all settings” function, do this instead:

  1. Select Reset LAN settings.
  2. Enable the wireless LAN.
  3. Select Reset LAN settings one more time.

HP printers

For HP LaserJet Pro 4001n printers, follow these steps from HP for a factory reset:

  1. HP printersTurn Off the Printer: Turn the printer completely turned off.
  2. Turn On the Printer: Turn the printer back on and wait for the HP logo to appear on the screen.
  3. Access the Preboot Menu: As soon as the HP logo appears, press and hold the “Cancel” button (usually marked with an “X”) until the “Preboot” menu appears on the display.
  4. Navigate to Administrator Settings: Use the arrow buttons to navigate to “Administrator” and press the “OK” button.
  5. Restore Factory Settings: In the “Administrator” menu, find and select “Restore Factory Settings.” Confirm your choice when prompted.  The printer will begin restoring factory settings.
  6. Wait for the Process to Complete: The printer will restart during this process.  Wait until it fully restarts and displays the home screen.

Additional Tips for Printer Security

  • Disable or limit the printer’s network connectivity, such as Wi-Fi, Bluetooth, or cloud services, if you don’t use them.
  • You can also turn off the printer’s memory or hard drive to erase your data after printing.
  • Enable the printer’s password, PIN, or biometric authentication to prevent anyone from accessing its data without permission.
  • Keep your printer’s software up to date.  Patches will close any security vulnerabilities that hackers could exploit.
  • Avoid connecting your printer to public Wi-Fi, which could make it vulnerable to spyware and other security risks.

rb-

Ensuring the security of your personal data extends beyond computers and smartphones to include often-overlooked devices like printers. Following the steps outlined in this article, you can effectively decommission your printer and protect sensitive information from potential cyber threats. Stay vigilant, keep your devices updated, and always perform a factory reset before disposing of any electronic device. Secure your printer today to safeguard your data and maintain your online privacy.

 

Related article

 

Ralph Bach has been in IT for a while and has blogged from the Bach Seat about IT, careers, and anything else that has caught my attention since 2005.  You can follow me on Facebook or Mastodon.  Email the Bach Seat here.

Is Smilodon Holding Back Your Career?

Is Smilodon Holding Back Your Career?In case you have not noticed the world is changing. People who know this stuff say our brains have not changed as much as our surroundings. Our brains are hardwired to keep us safe. It is called “negativity bias” which means we focus on the potential pain more than the potential good. This is why change is scary.

Is Smilodon Holding Back Your Career?These legacy fears are the result of millions of years of our ancestors being prey, not predators. Giant hyenas, cave bears, cave lions, eagles, snakes, other primates, wolves, saber-toothed cats, false saber-toothed cats, and maybe even giant, predatory kangaroos ate early humans. But in our knowledge-based world, the potential pain we expect (a tough meeting with the boss) won’t kill us– but we feel the same fear and pain as our primal ancestors did when they heard the saber-toothed cat roar.

And so we run the other way. At work, we miss more potential good because we’re hard-wired to avoid potential bad. Taking specific, intentional career risks helps us overcome our ancient hard wiring.

Percrocutidae In fact, avoiding risk is one of the most dangerous things you do for your career long term. After all, if you’re not being proactive about creating success on your terms–whatever and however that looks to you–no one is going to do it for you.

This infographic from Go Jump Las Vegas lists some of the positive influences that risk-taking has on our overall well-being. Step out of your comfort zone and start seizing amazing opportunities.

 

Risk taking

rb-

Think about your fears as the right response at the wrong time. The fear worked 50,000 years ago. It’s simply out of date. You’re using outdated software in your brain.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Riskiest ZIP Codes

Riskiest ZIP CodesCredit rating firm Experian recently published a list of the top 100 riskiest shipping ZIP codes for 2017. In the list, U.S. ZIP codes were rated on the number of attempted fraudulent e-commerce transactions against the population of overall e-commerce orders for the ZIP codes.

Experian’s analysis of fraudulent transactions says international IP addresses affect the overall riskiness of a transaction. e-Commerce transactions from international IP addresses are much riskier than average—6.7x riskier from a shipping perspective. Additionally, Experian’s analysis shows that traffic coming from a proxy server—which could originate from domestic and international IP addresses — is 74 times riskier
then the average transaction.

The riskiest ZIP code for e-commerce fraud in 2017 was 97079 in Beaverton, Oregon according to Experian. In fact, Oregon had nearly half of the top 25 riskiest ZIP codes in 2017. The areas in and around Portland OR occupied 10 of the top 25 spots for riskiest e-commerce transactions. Beaverton’s highest risk international IP county is China.

The Miami Florida area put the sunshine state at #2 in the top 25 with nearly a quarter of the riskiest ZIP codes. Miami had 6 of the top 25 slots for the next most risky ZIP Codes for e-commerce firms. The riskiest Miami ZIP code is 33122. Miami’s highest risk international IP county is Venezuela.

The riskiest Miami zip code is 33122.

South El Monte, California ZIP code 91733 is the third riskiest ZIP code on the Experian list for e-commerce firms to ship to. Experian says that 91733’s highest risk international IP countries are Taiwan and Hong Kong.

South El Monte, Califronia zip code 91733 is the third riskiest zip code

The riskiest Michigan ZIP code is 48204 in Detroit, which ranked 32nd on the list and is only 15% of the risk of Beaverton OR.

The riskiest Michigan Zip code is 48204 in Detroit

Other Michigan ZIP Codes on the top 100 list are:

RankCityStateZip CodeFraud Attack Rate
64DetroitMI48227276.6
68DetroitMI
48206270.3
74DetroitMI48228262.4

The top 25 riskiest ZIP Codes according to Experian. Fraud attack rates show the attempted fraudulent e-commerce transactions against the population of overall e-commerce orders.

RankCityStateZip CodeFraud attack rates
1Beaverton OR970792741.9
2Miami FL331221935.1
3South El MonteCA917331473.5
4Portland OR972511257.6
5Portland OR972501178.6
6Miami FL331661155.1
7Portland OR972521059.4
8Miami FL331981010.6
9Miami FL33195921.7
10Miami FL33192769.1
11Portland OR97253726.2
12Portland OR97230676
13Portland OR97217635.8
14Minden NV89423629.2
15HoustonTX77072625.4
16Portland OR97233623.4
17Wilmington DE19801584.6
18Portland OR97218562.1
19Des Moines IA50314544.1
20Chicago IL60621539.8
21Portland OR97203535.6
22Miami FL33191518.7
23Hillsboro OR97124505.3
24Portland OR97254502.5
25Manchester NH3101490.4

rb-

The increase in e-commerce fraud attacks should not surprise anyone. The growth of online information and the continuing tsunami of data breaches has put over 9.7 billion data records on the dark web. The plethora of stolen PII enables criminals to open fraudulent accounts, take over legitimate accounts and submit fraudulent transactions.

Another reason for the increase in online fraud activity is automation. In the past, criminals needed to do something, but they can now attack by simply downloading a file and automating the submission of thousands of applications or transactions
simultaneously.

Related article

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

BYOD Love Affair Waning?

BYOD Love Affair Waning?Tom Kaneshige at CIO.com warns that the “Bring Your Own Device” love affair is coming to an abrupt and bitter end, and the lawyers are circling. He argues that in the early days of BYOD, say, last year, employees, especially Millennials, fell madly in love with the idea of using their own Apple (AAPL) iPhones, Google (GOOG) Android smartphones, and newfangled tablets for work. Finally, they could finally ditch corporate-issued BlackBerrys (BBRY).

Bring your own deviceBYOD ushered in a new era of consumer tech in the enterprise, one that promised employees and employers will live happily ever after. But the BYOD romance has suddenly turned sour. Employees are questioning corporate intrusion on their personal devices. Did IT turn their beloved smartphone into a spy that tracks their whereabouts? The article says employees are beginning to sense companies taking advantage of BYOD by intruding on personal time to get free work time.

Now they’re thinking about suing. John Marshall, CEO at AirWatch, an enterprise mobile device management (MDM) vendor with 6,500 customers, told CIO, I anticipate a bunch of little [lawsuits], then something big will happen that’ll be a class action and become headline news.

Air Watch logoCEO Marshall reports that the suits have already started. A federal case in Chicago is winding its way through the courts which claims that the city owes some 200 police officers millions of dollars in overtime back pay. The case centers on allegations that the city pressured officers into answering work-related calls and emails over department-issued BlackBerrys during off-hours.

There’s no question BYOD blurs the line even more between work life and personal life. The Airwatch CEO not surprisingly recommends a Mobile Device Management (MDM) application to control email delivery to BYOD devices. This way an employer can set a business rule that won’t allow delivery of corporate email to a subset of users during off-hours. Or a CIO can address this issue in the BYOD terms-of-use agreement. (rb– Both would be best)

Smashed BYODThe CIO article offers up another legal nightmare scenario: Lacking MDM tools to block out what can and cannot be seen on a BYOD smartphone, a help desk technician notices that an employee’s device has a lot of personal apps about a health problem—and mentions his concern to the employee in the cafeteria.

The employee can say, ‘How in the world did you know that?‘” Mr. Marshall says. “All of a sudden, something that’s very benign and innocuous turns into something that’s blown out of proportion.” (rb- Help Net Security cites recent U.S. DHSS seven-figure settlements from healthcare institutions that failed to protect patients’ health information under HIPAA regs.)

terms-of-use agreementMr. Marshall recommends a comprehensive BYOD terms-of-use agreement, along with transparency about the capabilities and limitations of the technology, will help ward off such scenarios. The IT staff also needs to be educated about their role in a BYOD environment.

However, this doesn’t mean problems won’t crop up. Part of the problem, the article indicates, is that BYOD often puts business unit managers who aren’t well-versed in technical user agreements in a leadership position with mobile apps. They’re likely to give the green light to rogue mobile apps that violate such agreements.

location-based servicesFor instance, employees are chiefly concerned about privacy and especially location-based services with BYOD, and so many user agreements stipulate that apps will not collect location-based information. But someone who wants to be helpful, builds a map app for the corporate campus that allows employees to schedule conference rooms and find safety information, such as where to go if there’s a tornado. Airwatch’s Marshall explains:

Maybe there’s also a button on there that says where you are in the campus … All of a sudden people wake up and realize that every single device using that app is collecting location-based information—that’s an issue. These are really plausible scenarios … There’s so much copy and paste and reuse of all these components that these things can happen very innocently.

remote wipeThen there’s the dreaded remote wipe, which can land a company in some legal hot water according to the article. Help Net Security says there is little to no case law in this area. CIO.com reports that just last year, CIOs said they felt comfortable with BYOD because they held security’s holy grail: remote wipe, a scorched-earth capability for wiping all data on a mobile device.

But employees weren’t happy with the idea that the company can wipe personal data on their personal device. Some employees refused to take part in the BYOD program for this reason. Others waited days or weeks before reporting a lost or stolen device so that IT wouldn’t wipe it.

waited days or weeks before reporting a lost or stolen deviceMDM software advanced quickly and seemed to come up with a fix. Now companies can wipe only corporate apps from a BYOD smartphone or tablet, leaving personal apps untouched. In fact, AirWatch won’t even allow a full device wipe anymore for legal reasons. While this helps tremendously, it doesn’t completely solve the problem.

Mr. Marshall proposed a scenario where a company buys the popular productivity app, Evernote, for employees to put on their BYOD smartphones. Since the company paid for the app, the company can remove it at any time. The note-taking app collects company data but also might store personal data, too. An employee can use Evernote to create a shopping list, recipes, vacation plans, or perhaps something more critical to their job.

Finger pointingGuess what happens to this personal data when the employee leaves the company? The app, along with all the data, is wiped from the device and account. If the BYOD terms-of-use agreement about Evernote wasn’t spelled out clearly, who is liable for the lost data?

The bloom is off the BYOD rose, and so companies had better add protections against employee lawsuits in the BYOD terms-of-use agreement and leverage MDM to make sure the agreement is followed.

Truth is, employees tend to get a bit emotional when their privacy is violated or their location is tracked via a mobile device that they personally own. They don’t like their personal data to be wiped, either. When these things happen, companies can expect the wrath of a scorned employee. “That’s where it gets tricky,” Mr. Marshall told CIO.com.

Tony Busseri, CEO of Canadian digital security firm Route1, told Help Net Security:

Angry BossAlong with security concerns, BYOD has brought the potential of major legal issues for the Enterprise … Many current BYOD corporate policies leave enterprise data unprotected in the event of a security breach and during an employee’s exit from the company. The policy of tracking and wiping an employee’s personal device opens the enterprise up to the potential for mass litigation.

rb-

Misco in the UK reported that the majority of employees will not cooperate with employers’ BYOD efforts. According to the data:

  • 82% of the survey participants viewed their employer’s ability to track their location as an invasion of privacy;
  • 82% are concerned or extremely concerned about having their browsing history monitored;
  • 76% stated that they would not allow their company to view the applications installed on their personal mobile devices;
  • 75% said they would not go along with an installation made by their employer;
  • Only 15% had no concerns about employers tracking activities.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Detroit Safest Online City Again

Detroit Safest Online City AgainNorton, the anti-virus arm of Symantec (SYMC) teamed up with research firm Sperling’s BestPlaces to rank US cities based on a number of cybercrime risks and they found Detroit the safest online city for 2012. I wrote about Detroit’s 2011 ranking here.

DetroitBert Sperling, lead researcher for the analysis said, “By looking at data from consumer lifestyle habits as well as cybercrime data provided by Symantec, … we’re able to provide a holistic view of the various factors that put a person at potential risk.

The Huff Post reports that the study looked at the prevalence of Internet use in addition to the types of risks users face online. Consumer statistics include the number of PCs, use of smartphones, the use of social networks, e-commerce, and accessing potentially unsecured Wi-Fi hotspots. BestPlaces also looked at the following cybercrime data: bot-infected computers located within a specific city, attempted malware infections, spamming IP addresses found within a specific city, and web attacks originating within a specific city.

Wi=FiSymantec says Detroit had low scores in the number of Wi-Fi hotspots, potentially risky online consumer behavior, and PC expenditures. Other low-ranked cities include Tulsa and El Paso.

Users are at most risk for cybercrime in the following cities:

1. Washington
2. Seattle
3. San Francisco
4. Atlanta
5. Boston

SymantecWith the explosion of smartphones, tablets, and laptops in recent years, and the rise of apps and social networking sites, our online and offline lives are blending together in ways that we’ve never before experienced,” said Marian Merritt, Norton Internet Safety Advocate. “…this analysis highlights the potentially risky factors we face each time we go online. By taking a few simple precautions now, people can make sure they stay protected against online threats.”

Greg Donewar, manager of the National White Collar Crime Center told Huff Post,… over the past year, we’ve seen a considerable increase in cybercrime attacks, and whether a person lives in the riskiest online city or the safest, consumers everywhere need to be aware of the inherent dangers of online activity.

rb-

Forbes says that cyber-crime is a $37 billion crime that affects 1 in 25 Americans. Take these steps to protect yourself online:

Create better passwords. Avoid passwords like password, 123456, qwerty, abc123, or monkey, these are the top most common passwords (I have been writing about weak passwords for since 2010). Forbes says your first line of protection against cybercrime is to make sure all of your passwords follow these rules of thumb:

  • At least eight characters
  • A mix of these four types of characters: upper case letters, lower case letters, numbers, and special characters
  • Not a name, slang word, or any word in the dictionary
  • Don’t keep the same password; change it every six months
  • Have uniquely different passwords (not just slight variations of the same password) for every account and site

Monitor your financial accounts. If you shop online, use online banking, or have any personal or financial information available online, you are at risk of finance-related crimes like identity theft and fraud which Huff Post says costs the average victim $631 in out-of-pocket costs. Forbes says that one of the easiest ways to protect yourself is to monitor your credit to detect any red flags early. They recommend users set up spending limit alerts on credit cards and checking accounts to keep tabs on your balances. Automatically monitoring for suspicious activity and fraudulent accounts helps catch costly identity theft and fraud immediately.

Lockdown your smartphone. If you use your smartphone to shop, spend, socialize, and surf, your phone’s sensitive information essentially becomes a one-stop shop for cybercriminals. Forbes says if stolen or exposed to thieves, your smartphone can compromise your personal and financial information anytime and anywhere. Here’s a quick five-minute checklist from Forbes on how to properly secure your mobile phone:

  • Password-protect your phone with a complex and unique password, and set your phone so it auto-locks and never saves any passwords.
  • Enable a service with remote tracking. You can also set your phone to automatically wipe your data if your phone password is inputted incorrectly several times.
  • Turn Bluetooth off if you’re not using it. Thieves can pair their Bluetooth device with yours and hack personal information.
  • Be careful on public Wi-Fi networks where thieves can remotely access your data undetected. Only connect your phone to secure networks.
  • Before downloading any apps to your phone, always do a quick search to make sure it comes from a legitimate site or publisher. Check user reviews on sites like appWatchdog for complaints.
Related articles
  • Why you should password-protect your smartphone (ctv.ca)

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.