Chapter 5

IoT in an Office Environment—Printers, Smart TVs, Routers, and Uninvited Guests

Introduction

Most companies nowadays have some sort of cybersecurity policy in place; at least, it would be expected that they do! This should be the case even for medium and small enterprises. In the following pages, we will see that there are different types of motivation for an attacker to breach a system, so even a small organization is not free from the risk of cyber­attacks. Assuming that your organization already has cybersecurity policies in place, the main question would be whether their coverage of IoT is within their scope or not. These policies are generally oriented toward protecting the companies’ computers and servers and the critical information ...

Get Understanding Cyberrisks in IoT now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.