PLUGGING THE PRINTER SECURITY LOOPHOLE
Jun 24, 2019
4 minutes
BY BILL BENNETT
Your company's office network security is only as good as the weakest link. Attackers will test every loophole. They might know you've got valuable data stored somewhere or that you will be willing to pay Bitcoin for a cyber ransom, if only they can break through your defences.
The attackers might be online vandals wanting to wreak havoc for fun or they might have a sinister intent – such as using your technology to launch a future botnet attack.
The way this game works is that teams of attackers scour the Internet looking for low-hanging fruit. They will attack the most vulnerable first. Your job
You’re reading a preview, subscribe to read more.
Start your free 30 days