Skip to content
  • Home
  • CMMC Assessments
    • CMMC Level 1 Conformity Assessments
    • CMMC Level 2 Conformity Assessments
    • CMMC Level 3 Conformity Assessments
    • International CMMC Conformity Assessments
    • NIST SP 800-171 Conformity Assessments
    • CMMC Assessment FAQs
  • Consulting
    • Consulting Phase 1: Gap Assessment
    • Consulting Phase 2: Design & Plan
    • Consulting Phase 3: Remediation
    • Consulting Phase 4: Conformity Assessment Support
    • Information Security Assessments
    • CMMC FAQs
  • Resources
    • As the CMMC Churns
    • Understanding the Requirements
    • NIST SP 800-171 & CMMC Infographics and Whitepapers
    • NIST SP 800-171 & CMMC Templates
    • Glossary and Acronyms
  • Contact
  • About
    • C3PAO Operations
      • CMMC Level 2 Certification Appeals Policy
    • Legal
      • Mutual Non-Disclosure Agreement (MNDA)
      • CMMC Level 2 Certification Services Terms
      • Privacy Policy
      • Terms of Use
    • NAICS, NIGP, & SIC Codes
    • News & Events
    • Matthew Titcombe
    • James Goepel

Printers can hand hackers the keys to castle

  1. Home
  2. Printers can hand hackers the keys to castle

Printers can hand hackers the keys to castle

By Matthew Titcombe|2020-02-16T13:11:06-05:00September 22nd, 2018|Categories: News|Tags: advanced persistent threat, APT, article, best practices, cybersecurity, fundamentals, Information Security|

Printers can hand hackers the keys to castle

With the increasing threats caused by the Internet of Things (IoT) devices, Ms. Helen Robinson from the Colorado Springs Business Journal sought out expertise from our founder and CEO, Matthew Titcombe.

In the article, Mr. Titcombe shares his experiences with real-world Advanced Persistent Threats that exploited IoT devices in a  company’s network and steps a firm can take to protect themselves.

Read More

Share This Content!

FacebookXLinkedInWhatsAppTumblrPinterestEmail

Related Posts

Peak InfoSec Reauthorized to Conduct CMMC Level 2 Certification Assessments
Peak InfoSec Reauthorized to Conduct CMMC Level 2 Certification Assessments
Gallery

Peak InfoSec Reauthorized to Conduct CMMC Level 2 Certification Assessments

May 13th, 2025
Peak InfoSec and Fathom Cyber Announce Strategic Partnership to Provide Comprehensive CMMC Support
Peak InfoSec and Fathom Cyber Announce Strategic Partnership to Provide Comprehensive CMMC Support
Gallery

Peak InfoSec and Fathom Cyber Announce Strategic Partnership to Provide Comprehensive CMMC Support

January 28th, 2025
1 June 2022 ||  Peak InfoSec is now an Authorized C3PAO Press Release
1 June 2022 || Peak InfoSec is now an Authorized C3PAO Press Release
Gallery

1 June 2022 || Peak InfoSec is now an Authorized C3PAO Press Release

June 1st, 2022
25 May 2022 ||  Peak InfoSec is now an Authorized C3PAO
25 May 2022 || Peak InfoSec is now an Authorized C3PAO
Gallery

25 May 2022 || Peak InfoSec is now an Authorized C3PAO

May 25th, 2022
Capital One’s huge hack highlights cloud security risks

Capital One’s huge hack highlights cloud security risks

July 30th, 2019
© Copyright    |   Peak InfoSec LLC   |   All Rights Reserved   |   Privacy Policy   |   Powered by Mountain Air Marketing
Close Sliding Bar Area

Recent Posts

  • CMMC Metrics for the C-Suite
  • DIBCAC, FIPS, and Temporary Deficiencies
  • Peak InfoSec Reauthorized to Conduct CMMC Level 2 Certification Assessments
  • Peak InfoSec and Fathom Cyber Announce Strategic Partnership to Provide Comprehensive CMMC Support

Social Contact

Page load link
Go to Top