The Devices You Forgot Were Computers - IoT Security for Small Business

For our 30th episode, we're tackling the cybersecurity blind spot that almost no one discusses but everyone should worry about.

You've secured your laptops. You've rolled out multi-factor authentication. Your firewall is properly configured. But what about that office printer quietly storing every contract and payslip you've printed this year on a hard drive nobody ever wipes, with a password an attacker can guess in three tries?

This episode reveals the uncomfortable truth about Internet of Things (IoT) devices in your business. We're talking about printers, CCTV systems, smart thermostats, networked door locks, and every other "smart" device you've stopped thinking about as a computer.

Real Case Study: A 30-person marketing agency listened to our ransomware and authentication episodes, then invested £15,000 in proper security: new firewalls, endpoint protection, hardware authentication keys for every staff member, and a security audit that came back clean. Two months later, they discovered someone had been accessing their client files for weeks through their HP printer that still used factory default credentials.

What You'll Learn

  • Why your office printer is possibly the biggest security risk in your building

  • How default passwords on "forgotten" devices create easy access points for attackers

  • The real story of a £15,000 security investment defeated by a £300 printer

  • What network segmentation actually means and why it matters for small businesses

  • How to create and maintain an accurate device inventory

  • Practical steps to secure IoT devices without enterprise budgets

  • Why your CCTV system might be livestreaming to the internet right now

  • How smart thermostats become backdoors into your network

Key Quotes from the Episode

Noel Bradford: "Everything is connected, so everything needs at least some thought. You can't secure laptops and ignore printers. You can't roll out flawless multi-factor whilst your camera recorder still uses password 123. It all has to work together."

Mauven MacLeod: "Episode 30: The one where we ruin Christmas for every business owner who thought they were finally on top of things."

Graham Falkner: "Share this specific episode with anyone who has ever said it is just a printer. They need this in their life."

Practical Action Steps

This Week:

  1. Find your printer's admin interface. Log in. If you can't remember the password, that's probably because it's still set to "admin". Change it. Now.

  2. List five connected devices that aren't computers or phones. These are your starting inventory.

  3. Check one device's firmware. Is it up to date? When was it last updated? Who's responsible for keeping it current?

This Month:

  1. Complete device inventory using network scanning tools

  2. Change all default passwords on every printer, camera, thermostat, and access point

  3. Assess your network segmentation (can your printer access your file server? It shouldn't)

  4. Assign device ownership: every device needs someone responsible

Why This Episode Matters

We've covered passwords, multi-factor authentication, ransomware, supply chain attacks, shadow IT, and social engineering across 30 episodes. But we've deliberately avoided IoT security until now because we knew it would make people uncomfortable, possibly angry, and definitely worried.

The uncomfortable truth is that whilst you've been securing laptops and servers, your office printer has had full network access, stores every document you print, and still uses the password it shipped with.

This isn't theoretical paranoia. We're seeing breaches through IoT devices happen to businesses that have otherwise invested properly in cybersecurity.

Celebrating 30 Episodes

Since launching in June 2025, we've:

  • Reached Top 12 in Apple Podcasts Management category worldwide

  • Peaked at 3,500 daily downloads

  • Built an audience that's 47% US, 37% UK despite being a UK-focused show

  • Made cybersecurity almost entertaining whilst maintaining technical accuracy

  • Helped businesses actually implement security improvements, not just understand threats

The chart positions and download numbers are nice, but what matters more is when someone emails to say they've finally sorted Cyber Essentials or retired Dave from IT as a single point of failure.

Listen Now

Apple Podcasts: Currently Top 12 in Management category worldwide
Spotify: New episodes every week
All major podcast platforms: Search for "The Small Business Cyber Security Guy"

Resources Mentioned

  • NCSC Guidance: National Cyber Security Centre IoT security guidance

  • Network Discovery Tools: Fing, Advanced IP Scanner, or similar free network scanning utilities

  • Device Documentation: Spreadsheet templates available on our website

  • Hardware Authentication: AuthenTrend hardware keys (sponsor)

Need Help?

If you need direct assistance with IoT device security, Cyber Essentials, network segmentation, or any topic we've covered, contact us at: hello@thesmallbusinesscybersecurityguy.co.uk

Visit thesmallbusinesscybersecurityguy.co.uk for:

  • Detailed guides on everything we've discussed

  • Step-by-step walkthroughs for printer security, camera configuration, and network segmentation

  • Device inventory templates and checklists

  • All episode show notes and transcripts

Noel Bradford

Noel Bradford – Head of Technology at Equate Group, Professional Bullshit Detector, and Full-Time IT Cynic

As Head of Technology at Equate Group, my job description is technically “keeping the lights on,” but in reality, it’s more like “stopping people from setting their own house on fire.” With over 40 years in tech, I’ve seen every IT horror story imaginable—most of them self-inflicted by people who think cybersecurity is just installing antivirus and praying to Saint Norton.

I specialise in cybersecurity for UK businesses, which usually means explaining the difference between ‘MFA’ and ‘WTF’ to directors who still write their passwords on Post-it notes. On Tuesdays, I also help further education colleges navigate Cyber Essentials certification, a process so unnecessarily painful it makes root canal surgery look fun.

My natural habitat? Server rooms held together with zip ties and misplaced optimism, where every cable run is a “temporary fix” from 2012. My mortal enemies? Unmanaged switches, backups that only exist in someone’s imagination, and users who think clicking “Enable Macros” is just fine because it makes the spreadsheet work.

I’m blunt, sarcastic, and genuinely allergic to bullshit. If you want gentle hand-holding and reassuring corporate waffle, you’re in the wrong place. If you want someone who’ll fix your IT, tell you exactly why it broke, and throw in some unsolicited life advice, I’m your man.

Technology isn’t hard. People make it hard. And they make me drink.

https://noelbradford.com
Previous
Previous

Your £15,000 Security Investment Just Got Defeated by a £300 Printer

Next
Next

The Complete SMB Toolkit for Reverse Benchmarking: Free and Budget Tools That Actually Work