Smart devices in the workplace are you protected?

Click The Arrow For The Table Of Contents
smart home speaker on windowsill in conservatory

It does not seem that long ago since Amazon Alexa was considered brand new tech. Still, the reality is that the Alexa is now five years old (original release November 2014).

Since then, smart devices have increased in popularity and have even entered the workplace.

This article will help outline some of the risks posed by smart devices with the hope of making you and your workforce aware of what these devices in the workplace represent hidden threats.

First off let’s break down what types of devices we’re talking about here:

  • Smart Plugs
  • Smart Cameras
  • Speaker Devices
  • CCTV Systems
  • Door Entry Systems

There are many brands, but one thing’s for sure, they embed in day to day living. So much so that they’ve started entering the workplace connected to the corporate wifi.

These smart devices usually added by a rouge user that is attempting to solve a problem. But in reality, the device is opening a hole in the corporate network. While it may not seem like a significant concern, all it takes is a single flaw in any of these devices to allow cybercriminals access to your precious data.

These devices differ from a Windows or Mac-based PC connected to the corporate network. Regular PCs & workstations protect themselves with updates and patches are continually. Just one of the reasons you pay an IT firm to maintain and manage your IT infrastructure.

What’s the fix for securing these smart devices?

A complete network audit and regular network scanning of the internal network is something that can easily to your support contract. We are finding more and more customers requesting this as smart devices become popular.

Take the recent incident where someone hacked a Ring camera and was listening in to a child’s activities in the home. While this story became overhyped in the media, what would the outcome be if something similar happened in your office?

Trade secrets, confidential information or the loss of client data, the risk posed by these devices is worrying but only when you use your imagination. Somewhat similar to house insurance, protecting your corporate network against cyber threats is only deemed necessary after the fire.

For a complete cyber risk assessment of your network and IT infrastructure get in touch