Mon – Fri  9AM – 5PM|Client Portal
ITstuffed
Cybersecurity

Everyday Objects That Can Lead to Identity Theft

It is 9am on a Tuesday and your receptionist is printing patient consent forms. Your wireless printer hums away in the corner, connected to the same network as every computer in the practice. Nobody has updated its firmware since it was installed three years ago. Nobody thought to. It is, after all, just a printer.

This is how identity theft often works - not through a dramatic hack of a major system, but through overlooked everyday objects. Criminals know that people focus their security thinking on computers and passwords. So they look elsewhere. A wireless printer, an old work phone sitting in a drawer, a USB stick found in a car park - all of these have been used to steal personal and business data.

Wireless printers are a common weak point. Because they connect to the internet, they can store copies of sensitive documents - contracts, financial summaries, patient records - and they can be used as an entry point to reach other devices on the same network. Keeping printer firmware updated and switching the device off when it is not in use are simple steps that most practices never take. For practices handling patient records, dedicated healthcare IT support can help ensure these basics are consistently managed.

Old smartphones are another problem. People replace their phones every two or three years, and old devices tend to sit in drawers or get handed to charity shops before being properly wiped. A work phone that was used to access email, practice management software, or banking apps holds far more than people realise. Deleting visible files is not enough - a full data wipe is needed before any device leaves your hands. The same applies to old computers and external drives. Browsers alone store passwords, saved payment details, and months of login history. A managed IT support arrangement should include a proper disposal process for any outgoing device.

USB sticks deserve a specific mention. Finding a USB drive and plugging it in to see what is on it is a well-known tactic criminals use. They load the drive with malware and leave it somewhere it will be found - a car park, a waiting room, a shared office. The moment it is plugged in, the damage is done. The rule is simple: if you did not buy it, do not plug it in. Understanding the types of malware catching businesses off guard can help your team recognise and avoid these traps.

Physical paper still matters too. Pre-approved credit offers, old bank statements, voided cheques - these go into the recycling without a second thought. But any document with a name, address, account number, or IRD number is useful to an identity thief. A shredder is not a luxury item. It belongs in every professional practice.

Connected devices brought into a home or office environment - including anything marketed as a "smart" device - also need attention. Many of these are built with convenience in mind rather than security, and they are rarely updated after purchase. If a device connects to the internet, it is part of your network, and it needs to be treated accordingly. Knowing the unexpected ways hackers get into business accounts makes it easier to understand why every connected device carries risk.

The practical answer here is not a long checklist. It is making sure someone is responsible for this. A good IT support arrangement covers more than keeping computers running - it includes knowing what is connected to your network, ensuring devices are properly wiped before disposal, and flagging anything that creates unnecessary risk. For Canterbury businesses that handle sensitive client or patient information, a clear approach to cyber security needs to extend beyond the obvious.

If you are not sure whether your practice has these basics covered, ITstuffed offers a 15-minute IT Fit Check - no commitment required. Book a time here.