{"id":6225,"date":"2026-02-25T09:00:52","date_gmt":"2026-02-25T09:00:52","guid":{"rendered":"https:\/\/amtivo.com\/uk\/standards\/\/\/5-ways-smes-can-improve-printer-security\/"},"modified":"2026-02-25T10:22:52","modified_gmt":"2026-02-25T10:22:52","slug":"5-ways-smes-can-improve-printer-security","status":"publish","type":"standard-post-filter","link":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/5-ways-smes-can-improve-printer-security\/","title":{"rendered":"5 Ways SMEs Can Improve Their Printer Security"},"content":{"rendered":"<p><strong>In November 2018, a highly unusual cyber incident saw an estimated 50,000 printers worldwide begin printing unsolicited flyers asking readers to visit the YouTube channel of Internet star, PewDiePie.\u00a0<\/strong><\/p>\r\n<p><span data-contrast=\"auto\">While the stunt initially seemed light-hearted, it exposed a serious security flaw. Frustrated and confused, owners quickly took to social media to report the intrusion, often unsure how their devices had been accessed.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\r\n<p><span data-contrast=\"auto\">It didn\u2019t matter whether the printer was a sophisticated multi-function device used by large companies or a modest receipt printer of the sort used by millions of small businesses. If it was connected to the Internet <\/span><span data-contrast=\"auto\">and left unsecured, it was vulnerable. The attackers were able to remotely access and print from thousands of exposed machines across the globe.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\r\n<p><span data-contrast=\"auto\">Days later, the same hackers\u00a0<\/span><a href=\"https:\/\/www.bbc.co.uk\/news\/technology-46552339\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">struck again<\/span><\/a><span data-contrast=\"auto\">, this time printing instructions telling victims how to fix the firmware vulnerabilities that had made the campaign possible. The hackers also implied that not only was it possible to print from exposed machines, but they could also physically damage their electronics and interfere with data passing through them:<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\r\n<p><span data-contrast=\"auto\">\u201c<\/span><i><span data-contrast=\"auto\">The fallout goes beyond\u00a0printouts, we could also be capturing sensitive documents as they get printed or even modify documents as they get printed<\/span><\/i><span data-contrast=\"auto\">,\u201d they told the BBC.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\r\n<p>This is far from the only incident affecting printers in recent years. According to <a href=\"https:\/\/www.itpro.com\/security\/cyber-attacks\/2024-was-a-record-year-for-commercial-cyber-attacks\" target=\"_blank\" rel=\"noopener\">Beaming\u2019s 2024 cyber\u00a0attack research<\/a>, remotely controlled IoT (Internet of Things) devices were the most frequently targeted category, with business firewalls recording more than 161 daily attacks against connected systems such as networked printers.<\/p>\r\n<p>&nbsp;<\/p>\r\n<h2>IoT Pioneer<\/h2>\r\n<p>Printers aren\u2019t necessarily more vulnerable to attack than other devices, but they are almost always ignored. Printers are designed to perform a simple task &#8211; to print. Because of this, they are often overlooked within wider IT and cyber security strategies. It\u2019s been this way ever since HP released the first desk-side personal laser printer, the LaserJet, in 1984.<\/p>\r\n<p>Printers have always been fully-fledged computers, complete with their own main memory, microprocessors, data storage, network connectivity, and simple operating systems. Finally, around 20 years ago, they acquired built-in web and remote configuration, which meant people could connect and print documents or configure settings from anywhere in the world.<\/p>\r\n<p>Looking back, internet-connected printers were an early precursor to what we now call the Internet of Things (IoT). At the time, however, limited attention was paid to the risks of adding unmanaged, internet-connected devices to networks \u2014 devices that rarely, if ever, received software updates.<\/p>\r\n<p>&nbsp;<\/p>\r\n<h2>Printer Risks<\/h2>\r\n<p>Although large-scale cyber attacks targeting printers remain relatively uncommon, the proof-of-concept incidents highlighted above demonstrate that the risk is far from theoretical. If an attacker can identify and access a printer from inside or outside a network, this is a security gap that must be addressed.\u00a0<\/p>\r\n<h3>How might an attacker exploit a printer?<\/h3>\r\n<ol>\r\n\t<li><b><span data-contrast=\"auto\">Denial of service:\u00a0<\/span><\/b><span data-contrast=\"auto\">Sending a stream of print jobs to a printer to stop it from receiving legitimate traffic. Anecdotes suggest that this type of attack is not uncommon, which shouldn\u2019t be a surprise. In the 1980s and 1990s, attacks were launched on company fax machines and phone switchboards using the same MO.<\/span><\/li>\r\n\t<li><b><span data-contrast=\"auto\">Data theft:<\/span><\/b><span data-contrast=\"auto\">\u00a0Printers receive and print data. But what happens while the data are sitting in the print queue? If not encrypted, in principle it is vulnerable to theft by anyone able to access its management interface, including via Wi-Fi as well as across the network itself.<\/span><\/li>\r\n\t<li><b><span data-contrast=\"auto\">Network compromise:\u00a0<\/span><\/b><span data-contrast=\"auto\">Hacking a printer to use as a staging post for a lateral movement inside a network is supposed to be rare. This could be because it really is rare, or it might simply be because nobody monitors printers so would have no way of knowing if it had happened. As with most IoT, printers don\u2019t run security clients which means that compromises are not easy to see. If the printer has a serious unpatched vulnerability, a remote code exploit (RCE) could allow hackers to install malware.<\/span><\/li>\r\n\t<li><b><span data-contrast=\"auto\">Email compromise:<\/span><\/b><span data-contrast=\"auto\">\u00a0An\u00a0additional\u00a0trick used by hackers is to hijack a printer as a proxy to send a malicious document to someone\u2019s email address posing as a notification. Because the printer is legitimate, this is more likely to pass checks.<\/span><\/li>\r\n\t<li><b><span data-contrast=\"auto\">Document modification:\u00a0<\/span><\/b><span data-contrast=\"auto\">Intercepting printed material to change some of the data, for example a mailing address for goods.<\/span><\/li>\r\n<\/ol>\r\n<p><b><span data-contrast=\"auto\">\u00a0<\/span><\/b><\/p>\r\n<h2>Printer Security Checklist<\/h2>\r\n<p><span data-contrast=\"auto\">The good news is that fixing printer security\u00a0isn\u2019t\u00a0hard. The first task is to stop ignoring them\u00a0and address the glaring weaknesses.<\/span><\/p>\r\n<ol>\r\n\t<li><b><span data-contrast=\"auto\">Secure access:<\/span><\/b><span data-contrast=\"auto\">\u00a0After carrying out an audit to\u00a0establish\u00a0the state of the printer population, turn off remote Internet printing access. This stops the printer from being visible to specialised search engines. Then turn off unused software ports and unneeded protocols that might further expose it inside or outside the network.<\/span><\/li>\r\n\t<li><b><span data-contrast=\"auto\">Authentication:<\/span><\/b><span data-contrast=\"auto\"> Default login credentials are a big weakness. These should be changed, and any additional authentication turned on if supported. Authentication can also be turned on to receive a print job. The printer admin interface itself should be protected by changing any credentials.<\/span><\/li>\r\n\t<li><b><span data-contrast=\"auto\">Regular patching:\u00a0<\/span><\/b><span data-contrast=\"auto\">Patching vulnerabilities seems obvious, but not all vendors do this quickly enough or make it easy to do. The patching schedule for drivers and firmware should be assessed as carefully as printer features and price before buying a printer. Sometimes, updating can be done automatically by the printer vendor, which might be the safest option.<\/span><\/li>\r\n\t<li><b><span data-contrast=\"auto\">Data encryption:\u00a0<\/span><\/b><span data-contrast=\"auto\">Encrypting print jobs adds a useful layer of security, along with some complexity (receiving the decrypted document requires authenticating first).<\/span><\/li>\r\n\t<li><b><span data-contrast=\"auto\">Independent testing:<\/span><\/b><span data-contrast=\"auto\"> Buyers Lab has developed a testing process that examines the security of printer vendors. Note: not every name is on the approved list (yet).<\/span><\/li>\r\n<\/ol>\r\n<p>&nbsp;<\/p>\r\n<h2>Cyber Essentials and ISO 27001 Certification for SME Cyber Security<\/h2>\r\n<p>Printers and other internet-connected devices are a common but often overlooked source of cyber security risk for SMEs. Certification to recognised standards such as <a href=\"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/certification\/\">Cyber Essentials<\/a>,\u00a0<a href=\"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/certification\/\">Cyber Essentials Plus<\/a>, or\u00a0<a href=\"https:\/\/amtivo.com\/uk\/standards\/iso-27001\/certification\/\">ISO 27001<\/a> can help organisations demonstrate that baseline cyber security controls are in place to protect networks, connected devices, and sensitive data.<\/p>\r\n<p><b><span data-contrast=\"auto\">British Assessment Bureau<\/span><\/b><span data-contrast=\"auto\">\u00a0provides\u00a0<\/span><b><span data-contrast=\"auto\">UKAS-accredited certification\u00a0<\/span><\/b><span data-contrast=\"auto\">for SMEs across the UK.<\/span><\/p>\r\n<p>Request a\u00a0<a href=\"https:\/\/amtivo.com\/uk\/certification-quote\/\">quote\u00a0today<\/a>, or\u00a0<a href=\"https:\/\/amtivo.com\/uk\/contact-us\/\">contact our team<\/a>\u00a0to find out more about the\u00a0<a href=\"https:\/\/info.british-assessment.co.uk\/hubfs\/BAB\/Guides\/Amtivo%20Toolkit%20Process.pdf?_gl=1*y4jwk2*_ga*NjkwMjY4MDE5LjE3NjkwMDg5MjE.*_ga_XQRE5F348Y*czE3NzE5OTkxMTQkbzU5JGcxJHQxNzcyMDA1Mjg0JGo1NCRsMCRoMTY2NjYyMDcwOA..*_gcl_au*NTc3NjA0NjYxLjE3NzEzMjc2MzI.\">cyber security certification process<\/a>\u00a0and the next steps.<\/p>","protected":false},"excerpt":{"rendered":"In 2018 an estimated 50,000 printers worldwide started printing flyers asking readers to visit the YouTube channel of Internet star, PewDiePie.","protected":false},"author":24,"featured_media":6226,"template":"","meta":{"_acf_changed":false,"_searchwp_excluded":"","footnotes":""},"standard-post-categories":[31],"standard-post-tags":[32],"class_list":["post-6225","standard-post-filter","type-standard-post-filter","status-publish","has-post-thumbnail","hentry","standard-post-categories-insights","standard-post-tags-cyber-essentials"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>5 Ways SMEs Can Improve Their Printer Security<\/title>\n<meta name=\"description\" content=\"Learn five ways SMEs can help to improve printer security, reduce IoT risks, and prevent data theft, network compromise, and unauthorised printing.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/5-ways-smes-can-improve-printer-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 Ways SMEs Can Improve Their Printer Security\" \/>\n<meta property=\"og:description\" content=\"Learn five ways SMEs can help to improve printer security, reduce IoT risks, and prevent data theft, network compromise, and unauthorised printing.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/5-ways-smes-can-improve-printer-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Amtivo UK\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-25T10:22:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/09\/selective-focus-of-businessman-with-papers-at-prin-2022-11-02-02-29-49-utc.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"626\" \/>\n\t<meta property=\"og:image:height\" content=\"418\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/04\/testimonialImage-placeholder.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"5 Ways SMEs Can Improve Their Printer Security","description":"Learn five ways SMEs can help to improve printer security, reduce IoT risks, and prevent data theft, network compromise, and unauthorised printing.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/5-ways-smes-can-improve-printer-security\/","og_locale":"en_GB","og_type":"article","og_title":"5 Ways SMEs Can Improve Their Printer Security","og_description":"Learn five ways SMEs can help to improve printer security, reduce IoT risks, and prevent data theft, network compromise, and unauthorised printing.","og_url":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/5-ways-smes-can-improve-printer-security\/","og_site_name":"Amtivo UK","article_modified_time":"2026-02-25T10:22:52+00:00","og_image":[{"width":626,"height":418,"url":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/09\/selective-focus-of-businessman-with-papers-at-prin-2022-11-02-02-29-49-utc.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_image":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/04\/testimonialImage-placeholder.jpg","twitter_misc":{"Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/5-ways-smes-can-improve-printer-security\/","url":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/5-ways-smes-can-improve-printer-security\/","name":"5 Ways SMEs Can Improve Their Printer Security","isPartOf":{"@id":"https:\/\/amtivo.com\/uk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/5-ways-smes-can-improve-printer-security\/#primaryimage"},"image":{"@id":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/5-ways-smes-can-improve-printer-security\/#primaryimage"},"thumbnailUrl":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/09\/selective-focus-of-businessman-with-papers-at-prin-2022-11-02-02-29-49-utc.jpg","datePublished":"2026-02-25T09:00:52+00:00","dateModified":"2026-02-25T10:22:52+00:00","description":"Learn five ways SMEs can help to improve printer security, reduce IoT risks, and prevent data theft, network compromise, and unauthorised printing.","breadcrumb":{"@id":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/5-ways-smes-can-improve-printer-security\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/5-ways-smes-can-improve-printer-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/5-ways-smes-can-improve-printer-security\/#primaryimage","url":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/09\/selective-focus-of-businessman-with-papers-at-prin-2022-11-02-02-29-49-utc.jpg","contentUrl":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/09\/selective-focus-of-businessman-with-papers-at-prin-2022-11-02-02-29-49-utc.jpg","width":626,"height":418,"caption":"5 ways SMEs can improve their printer security"},{"@type":"BreadcrumbList","@id":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/5-ways-smes-can-improve-printer-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/amtivo.com\/uk\/"},{"@type":"ListItem","position":2,"name":"Standards","item":"https:\/\/amtivo.com\/uk\/standards\/"},{"@type":"ListItem","position":3,"name":"Cyber Essentials","item":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/"},{"@type":"ListItem","position":4,"name":"Insights","item":"https:\/\/amtivo.com\/uk\/standards\/insights\/"},{"@type":"ListItem","position":5,"name":"5 Ways SMEs Can Improve Their Printer Security"}]},{"@type":"WebSite","@id":"https:\/\/amtivo.com\/uk\/#website","url":"https:\/\/amtivo.com\/uk\/","name":"Amtivo","description":"","publisher":{"@id":"https:\/\/amtivo.com\/uk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/amtivo.com\/uk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/amtivo.com\/uk\/#organization","name":"Amtivo","url":"https:\/\/amtivo.com\/uk\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/amtivo.com\/uk\/#\/schema\/logo\/image\/","url":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/10\/cropped-BAB-Amtivo-Joint-Logo-Updated-300ppi.png","contentUrl":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/10\/cropped-BAB-Amtivo-Joint-Logo-Updated-300ppi.png","width":371,"height":203,"caption":"Amtivo"},"image":{"@id":"https:\/\/amtivo.com\/uk\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/standard-post-filter\/6225","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/standard-post-filter"}],"about":[{"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/types\/standard-post-filter"}],"author":[{"embeddable":true,"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/users\/24"}],"version-history":[{"count":18,"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/standard-post-filter\/6225\/revisions"}],"predecessor-version":[{"id":11194,"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/standard-post-filter\/6225\/revisions\/11194"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/media\/6226"}],"wp:attachment":[{"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/media?parent=6225"}],"wp:term":[{"taxonomy":"standard-post-categories","embeddable":true,"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/standard-post-categories?post=6225"},{"taxonomy":"standard-post-tags","embeddable":true,"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/standard-post-tags?post=6225"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}