Fluid IT Blog | Latest information on Managed IT Services and solutions

The Office Devices Your IT Team Isn't Watching (But Attackers Are)

Written by Kurt Thomas | Apr 30, 2026 11:59:59 AM

Introduction

When businesses think about securing their network, the focus tends to fall on computers, servers, and cloud applications—the systems where work happens and data lives. What receives far less attention is the expanding population of connected devices that sit alongside those systems: printers, multifunction copiers, smart TVs in conference rooms, building access systems, HVAC controllers, security cameras, and the growing category of Internet of Things devices that businesses adopt for convenience without fully accounting for the security implications. These devices connect to the same network as everything else. They receive far less security scrutiny than everything else. And attackers know it.

Why Printers and Copiers Are a Serious Security Risk

The modern multifunction printer is a sophisticated networked computer. It has a processor, an operating system, internal storage, and connectivity to the internet, email systems, and cloud storage services. It stores images of every document scanned or copied through it. It has a web-based administrative interface, almost always protected by default credentials that are publicly documented and rarely changed. And it receives firmware updates that most IT teams never apply because printers are not part of the standard patch management workflow.

Attackers who gain access to a networked printer gain access to a device that may hold scanned copies of sensitive documents, has credentials for email and cloud storage services stored in its configuration, and can be used as a foothold for lateral movement to the rest of the network. This is not a theoretical threat—researchers have repeatedly demonstrated practical attacks against enterprise printers, and real-world incidents involving compromised print infrastructure have been documented in breach investigations.

The Broader IoT Problem

Printers are the most familiar example of a much broader category. Smart TVs in conference rooms connect to the same network segment as executive laptops and may run outdated software with known vulnerabilities. IP cameras and physical security systems often ship with weak default credentials and minimal security testing. Building automation systems—HVAC, lighting, access control—are increasingly networked and increasingly targeted. HVAC access was the initial intrusion vector in one of the most significant retail data breaches in recent history.

The common thread across all of these devices is that they were selected and deployed for a specific operational purpose, by people focused on that purpose, without security evaluation as a significant criterion. The vendor relationship is often with facilities management or operations rather than IT, which means these devices frequently exist entirely outside the IT team's visibility and management.

What Good IoT Security Practice Looks Like

  • Network segmentation for IoT devices: Connected devices that do not need access to business systems should be isolated on a separate network segment with firewall rules preventing lateral access. A compromised printer on an isolated segment cannot reach your file servers.
  • Default credential elimination: Every networked device should have its administrative credentials changed from factory defaults before it is placed on the network. This single step eliminates the most commonly exploited IoT vulnerability.
  • Firmware and software updates: IoT devices receive security patches just like computers. Building these devices into the patch management workflow—or selecting managed devices that update automatically—closes vulnerabilities that attackers actively scan for.
  • Device inventory inclusion: Printers, cameras, smart displays, and building systems should appear in the IT asset inventory alongside computers and servers. You cannot monitor or manage what you have not documented.
  • End-of-life planning: IoT devices stop receiving security updates when the manufacturer discontinues support—often much sooner than the device stops functioning. Including IoT hardware in refresh planning prevents the accumulation of permanently unpatched devices.

The Overlooked Audit

One of the most useful exercises for any business concerned about this risk is a simple network discovery scan—enumerating every device currently connected to the network and comparing the results against the IT asset inventory. The gap between what IT believes is on the network and what is actually on the network is almost always larger than expected, and the unrecognized devices in that gap represent the most immediately actionable security findings available.

Conclusion

The attack surface of a modern business extends well beyond the devices that IT actively manages. Every connected device—regardless of whether it was selected by IT, regardless of how peripheral its function seems—is a potential entry point for an attacker who is looking for the path of least resistance. The organizations that close this gap do not necessarily have more sophisticated security programs. They have more complete ones.