I Need IT Support Now
Forescout 2026
Shane

The 20 Riskiest Connected Devices Threatening Your Houston Business in 2026

Industry Risk Scores Vary Widely – Financial Services Leads the List – Network Infrastructure Replaced Endpoints as the Top Attack Target

The 20 Riskiest Connected Devices Threatening Your Houston Business in 2026
2026 Cybersecurity Research
The 20 Riskiest Connected Devices Threatening Your Houston Business in 2026

Forescout's latest research reveals routers, VoIP systems, and medical
devices top the risk charts - and Houston businesses need to pay attention.

TL;DR
Forescout's 2026 report identifies 20 high-risk device types across IT, IoT, OT, and medical categories. Routers now carry 32 vulnerabilities each on average, financial services faces 3x the risk of retail, and 11 new device types appeared on this year's list for the first time.

Forescout Research - Vedere Labs released their annual Riskiest Connected Devices report on March 23, 2026, and the findings should give every Houston business owner a reason to look harder at what's actually connected to their network. The report analyzed millions of devices using a multifactor risk scoring methodology that evaluates configuration weaknesses, device function criticality, and internet exposure.

The headline number: 11 new device types appeared on the risk list this year - the second-largest year-over-year shift on record. Attackers are not sticking to the same targets. They're expanding into device categories that most businesses don't monitor closely, including time clocks, RFID readers, and power distribution units.

CinchOps is a managed IT services provider based in Katy, Texas, serving small and mid-sized businesses across the Houston metro area. CinchOps specializes in cybersecurity, network security, managed IT support, VoIP, and SD-WAN for businesses with 10-200 employees.

Why this matters for Houston SMBs: The devices flagged in this report - routers, printers, VoIP phones, UPS units - aren't exotic enterprise gear. They're sitting in offices across Katy, Sugar Land, and Houston right now, often running outdated firmware nobody has checked in years.
The 2026 Device Risk Rankings
Forescout identified the five riskiest device types across four categories: IT, IoT, OT, and IoMT.

The report breaks connected devices into four domains - Information Technology (IT), Internet of Things (IoT), Operational Technology (OT), and Internet of Medical Things (IoMT) - and ranks the top five riskiest in each. Of the 20 devices on the 2026 list, nine carried over from 2025. The other 11 are brand new entries.

Rank IT IoT OT IoMT
1 Router VoIP System Power Distribution Unit (PDU) Medication Dispensing System
2 Serial-to-IP Converter Printer Physical Access Control System Medical Image Printer
3 Workstation Time Clock UPS DICOM Gateway
4 Firewall Network Video Recorder (NVR) I/O Module MRI Scanner
5 Domain Controller RFID Reader BACnet Router Healthcare Workstation

Three device types have appeared consistently since 2022: routers, VoIP systems, and UPS devices. Routers bounced back to the #1 IT spot after dropping to fifth in 2025 - they held the top position in 2024 and 2022 as well. VoIP systems climbed from third to first in IoT.

The new entrants tell the real story. Serial-to-IP converters, time clocks, RFID readers, PDUs, I/O modules, BACnet routers, medication dispensing systems, medical image printers, DICOM gateways, and MRI scanners all appeared for the first time. That's a signal: attackers are probing device categories that most security teams don't watch closely.

Riskiest Connected Devices in 2026
Source: Forescout Research - Vedere Labs | Top 5 per category
IT
IoT
OT
IoMT
1 Router
1 VoIP System
1 PDU New
1 Medication Dispenser New
2 Serial-to-IP Converter New
2 Printer New
2 Physical Access Control
2 Medical Image Printer New
3 Workstation New
3 Time Clock New
3 UPS
3 DICOM Gateway New
4 Firewall
4 NVR
4 I/O Module New
4 MRI Scanner New
5 Domain Controller
5 RFID Reader New
5 BACnet Router New
5 Healthcare Workstation
Network Infrastructure: The Primary Attack Target
Routers and firewalls now concentrate the most dangerous vulnerabilities on business networks.

Network infrastructure devices overtook endpoints as the riskiest IT device category starting in 2024, and that trend accelerated in 2026. Forescout's 2025 Threat Roundup found that network infrastructure exploitation grew from 3% in 2022 to 19% in 2025, making these devices the second most exploited category overall.

Cyber Alert: Router Vulnerability Exposure

The numbers on routers are stark. They carry an average of 32 vulnerabilities per device and account for roughly a third of all critical-severity, high-exploitability vulnerabilities found across organizational networks. Firewalls also contribute a significant share. These devices sit at the network perimeter, often with exposed management ports, zero-day vulnerabilities, and outdated firmware that nobody has touched in months or years.

Weak or reused credentials on management interfaces make the problem worse. Brute-force attacks against router and firewall admin portals remain a common attack vector.

Serial-to-IP converters are a new addition worth watching. These devices bridge legacy serial interfaces (RS-232) to IP networks and show up across industrial control systems, building automation, and medical networks. They run with default credentials, rarely get patched, and can serve as pivot points between IT and OT environments. For Houston's manufacturing and oil and gas companies, these converters may be connecting production floor equipment to corporate networks right now without anyone flagging the risk.

"In 30 years of managing networks, the pattern is always the same - businesses lock down their laptops and servers but forget about the router in the closet running five-year-old firmware. That router is now the #1 target on the list, and it's sitting unpatched in thousands of offices across the Houston metro."
- Shane Stevens, CEO of CinchOps
IoT Devices Nobody's Watching
Printers, time clocks, and RFID readers join VoIP systems and NVRs as top IoT risks.

VoIP systems took the #1 IoT risk spot in 2026. These devices are frequently internet-exposed, configured with unnecessary open ports, protected by weak credentials, and running outdated firmware. IP phones appeared among the most common device types with outdated firmware and among the most vulnerable overall. For the hundreds of Houston businesses running VoIP phone systems - including many of our own clients - this should be a priority check item.

Network Video Recorders (NVRs) dropped from first to fourth but remain a persistent target. A vulnerability in Hikvision NVRs was the third most exploited vulnerability in both 2024 and 2025. These devices get recruited into botnets at a high rate.

Three new IoT device types are worth flagging:

  • Printers - both multifunction office devices and specialized receipt, label, and wristband printers - rank among the most common devices running outdated firmware and configured with default credentials. They're connected to sensitive environments like point-of-sale systems and privileged workstations. That label printer in a warehouse or the receipt printer at a wealth management front desk is a legitimate entry point.
  • Time clocks track working hours using PINs, badges, or biometrics and connect directly to HR and payroll systems. They're deployed by system integrators and then forgotten by security teams.
  • RFID readers handle access control and inventory tracking, connecting to ERP systems. Weak segmentation or direct internet exposure turns these into quiet entry points - particularly in guest-accessible areas like hospital lobbies and retail locations.
Devices That Are Rarely Patched
These "set and forget" devices are installed, connected, and then ignored by security teams
🖨️
Printers
Default creds / outdated firmware
📞
VoIP Phones
Open ports / weak credentials
⏱️
Time Clocks
HR/payroll system access
📡
RFID Readers
ERP integration / weak segmentation
🔋
UPS Units
Default creds / power disruption
🔌
Serial-to-IP Converters
IT/OT pivot point / rarely patched

The common thread: these are "set and forget" devices. Someone installs them, connects them to the network, and walks away. Nobody updates the firmware. Nobody changes the default password. Nobody segments them from the rest of the network. A Houston law firm's unpatched office printer sits on the same subnet as their client file server, and that's the kind of gap attackers are counting on.

Is Your Network Equipment at Risk?

Most Houston businesses don't know the firmware version running on their routers and firewalls. We can find out in 15 minutes.

Schedule a Free Assessment
OT and Medical Device Risks Expand
Data center power equipment and medical imaging systems carry serious, often unmonitored risks.

The OT category saw the most turnover, with three new device types: power distribution units (PDUs), I/O modules, and BACnet routers. PDUs and UPS devices are present in every data center and server room. Modern PDUs are network-connected with remote management capabilities. CISA has specifically warned about attackers targeting UPS devices with default credentials to shut off power or damage sensitive equipment through voltage manipulation. The same attack scenarios apply to PDUs.

BACnet routers connect building automation networks and rank as the third most attacked OT protocol. For Houston construction companies and property managers operating smart buildings, these devices sit at the intersection of building controls and corporate IT. Poor segmentation means a compromised BACnet router could provide access to HVAC, lighting, badge access, and fire safety systems.

The medical device list changed significantly. Medication dispensing systems - known to be vulnerable since researchers documented 1,418 vulnerabilities on just seven third-party components of a single popular device nearly a decade ago - took the top IoMT spot. They commonly run outdated firmware.

Imaging-related devices broke into three separate entries: MRI scanners, DICOM gateways, and medical image printers. These devices run on legacy hardware and software, require extensive network connectivity, and are frequent targets. Forescout documented real-world campaigns where attackers scanned for exposed medical imaging systems and exploited weaknesses in DICOM applications to infect patient devices. For healthcare organizations in the Texas Medical Center and across the Houston metro, medical device security isn't optional - it's a HIPAA compliance requirement and a patient safety issue.

Healthcare and OT Environments Need Cross-Domain Visibility

Attackers don't respect network boundaries. Ransomware moves from IT workstations to OT systems to medical devices. Protecting your business requires security that spans all connected device categories, not just the ones running Windows.

Learn about CinchOps cybersecurity services →
Industry Risk: Financial Services Leads by a Wide Margin
Average device risk varies dramatically by sector, with financial services at more than 3x the level of retail.

Forescout analyzed the five industries with the largest number of connected devices and found a stark gap. Financial services carried the highest average device risk, followed by government and healthcare. The difference isn't marginal - financial services risk was more than three times that of retail, and government risk was more than double that of manufacturing.

Industry Primary Risk Factor Legacy Windows % Telnet Exposure Trend
Financial Services Highest overall device risk (3x retail); 65% traditional IT OS 29% 3% to 12%
(biggest increase)
Government 2x manufacturing risk; 72% special-purpose OS ~25% Slight decrease
Healthcare 8% mobile OS (highest); imaging device concentration 35% 6% to 8%
Manufacturing Traditional IT OS dominant; growing embedded device risk Low 5% to 12%
Retail Highest legacy Windows at 39%; special-purpose OS at 61% 39% Slight decrease

For Houston's CPA firms and wealth management practices, the financial services data is concerning. The highest overall risk score combined with a Telnet exposure jump from 3% to 12% means these organizations have both the most to lose and some of the fastest-growing gaps. Telnet transmits everything - including credentials - in plain text. There is no legitimate reason for a financial services firm to have Telnet running on 12% of its devices in 2026.

Operating system fragmentation adds another layer. Special-purpose operating systems (embedded firmware, networking OS) now dominate in government (72%), retail (61%), and healthcare (56%). These systems are hard to track, rarely patched automatically, and frequently running outdated or unsupported firmware. The devices most commonly running outdated firmware include label printers (26%), switches (19%), IP phones (12%), medication dispensing systems (11%), and standard printers (7%).

The Windows 10 Legacy Problem
End of support has accelerated legacy Windows exposure across every industry.

Windows 10 reached end of support on October 14, 2025, and the impact shows clearly in Forescout's data. Legacy Windows percentages increased across all five industries analyzed. Retail leads at 39%, followed by healthcare at 35% and financial services at 29%.

Legacy Windows by Industry
Percentage of devices running unsupported Windows versions after October 2025 end of support
39%
Retail
35%
Healthcare
29%
Financial
~25%
Government
~4%
Manufacturing

The report notes that across all five industries, more than half of non-legacy Windows devices had previously been running Windows 10. Organizations can enroll in Microsoft's Extended Security Updates (ESU) program, but Forescout can't determine which devices are actually covered. That uncertainty is itself a risk - if you don't know which machines are getting security patches and which aren't, you have a visibility gap that attackers will find before you do.

We see this pattern at least twice a month with businesses in the Cypress and Woodlands area. A company with 50 workstations assumes IT handled the Windows 11 upgrade, but a quick scan shows 15-20 machines still on Windows 10 without ESU coverage. Those machines are running unpatched, and each one is an open door.

Open Ports and Vulnerability Reality
Telnet exposure is growing, and routers hold the most dangerous vulnerabilities.

Forescout tracked four commonly exploited protocols across industries: SMB, RDP, SSH, and Telnet. The most alarming finding is Telnet. Its usage increased in financial services, healthcare, and manufacturing - despite being an unencrypted protocol that should have been retired years ago. Financial services saw Telnet exposure jump from 3% to 12%. Manufacturing went from 5% to 12%. Healthcare climbed from 6% to 8%.

SSH and Telnet are rising across most industries, which signals growing exposure of OT and IoT infrastructure management interfaces. RDP and SMB have stabilized or declined in most sectors - a sign that traditional IT protocol hygiene is improving even as embedded device management falls behind.

Default credentials on management interfaces remain widespread. The device types most commonly configured with default passwords include printers, print servers, PLCs, and serial-to-IP converters. These aren't edge cases - these are devices in active use on production networks.

On the vulnerability front, the distinction between total vulnerabilities and dangerous vulnerabilities matters. Computers have the most vulnerabilities by volume (59% of all detected vulnerabilities). But when you filter for only critical-severity vulnerabilities with extreme exploitability scores, routers jump to #1 at 34%, followed by wireless access points at 23% and computers at 19%.

Routers average 32 vulnerabilities per device. Wireless access points and healthcare workstations average 18 each. Computers average 14. The takeaway: your router has more than twice as many vulnerabilities per device as the average workstation, and the vulnerabilities it carries are more likely to be weaponized.

Connected Device Security Self-Assessment

  • Do you know the firmware version running on every router, switch, and firewall on your network?
  • Have you changed the default credentials on all printers, VoIP phones, and network-connected devices?
  • Is Telnet disabled on all devices where SSH is available as an alternative?
  • Are your IoT and OT devices on segmented network segments, separate from workstations and servers?
  • Have all Windows 10 machines been upgraded to Windows 11 or enrolled in Microsoft's ESU program?
If you answered "no" or "I'm not sure" to any of these, your network has gaps that match the attack patterns in this report.
How CinchOps Can Help
Protecting Houston businesses across all connected device categories.

The Forescout report makes one thing clear: security that only covers laptops and servers misses the devices attackers are actually targeting. CinchOps provides managed IT and cybersecurity services that address the full range of connected devices in your environment - from routers and firewalls to VoIP phones, printers, and OT equipment.

  • Network Device Audit and Hardening - We inventory every connected device on your network, identify outdated firmware, default credentials, and exposed management ports, then remediate the gaps before attackers find them.
  • Network Segmentation - IoT devices, OT equipment, and guest Wi-Fi belong on isolated network segments. We design and implement segmentation that limits lateral movement if any single device is compromised.
  • Firmware and Patch Management - Routers, switches, firewalls, VoIP phones, and printers all need regular firmware updates. We track versions across your entire device inventory and apply patches on a managed schedule.
  • Windows 10 Migration Support - We handle the full transition from Windows 10 to Windows 11, including hardware assessment, data migration, and application compatibility testing. No machine gets left behind unpatched.
  • Continuous Monitoring and Threat Detection - Our managed security services monitor network traffic for signs of compromise across all device types - not just endpoints. If an attacker brute-forces a router admin panel or pivots through a printer, we catch it.
  • Credential Hygiene Enforcement - We audit and replace default credentials across all network-connected devices, enforce strong password policies on management interfaces, and implement multi-factor authentication where supported.

Businesses across Houston, Katy, Sugar Land, and Cypress trust CinchOps to keep their connected devices secure, patched, and properly segmented. The attack surface is bigger than it was last year - and it's only getting wider.

100% Free

Know Your Business Security Score

Get a FREE comprehensive security assessment for your Houston area business. Understand vulnerabilities across your network, applications, DNS, and more.

Frequently Asked Questions

What are the riskiest connected devices in 2026 according to Forescout?

Forescout's 2026 report identifies routers as the riskiest IT device, VoIP systems as the riskiest IoT device, power distribution units as the riskiest OT device, and medication dispensing systems as the riskiest medical device. Routers carry an average of 32 vulnerabilities per device and account for 34% of the most critical vulnerabilities found on enterprise networks.

Why are routers and firewalls a bigger target than computers?

Computers have more total vulnerabilities, but routers and firewalls concentrate the most dangerous ones - critical severity with extreme exploitability scores. Network infrastructure devices sit at the perimeter with exposed management ports, outdated firmware, and weak credentials. Forescout found that network infrastructure exploitation grew from 3% of attacks in 2022 to 19% in 2025.

Which industries face the highest connected device risk?

Financial services carries the highest average device risk in Forescout's 2026 dataset, with risk scores more than three times higher than retail. Government ranks second at more than double the manufacturing average. Healthcare ranks third, driven by legacy Windows devices, mobile OS complexity, and vulnerable medical imaging equipment.

How does the end of Windows 10 support affect device security?

Windows 10 reached end of support on October 14, 2025, and legacy Windows percentages increased across all industries in Forescout's data. Retail has 39% legacy Windows devices, healthcare has 35%, and financial services has 29%. Devices not enrolled in Microsoft's Extended Security Updates program no longer receive security patches for newly discovered vulnerabilities.

What should Houston businesses do to reduce connected device risk?

CinchOps recommends five immediate actions: audit and update firmware on all routers, switches, and firewalls; change default credentials on every network-connected device including printers and VoIP phones; disable Telnet wherever SSH is available; segment IoT and OT devices onto isolated network segments; and complete Windows 10 to Windows 11 migrations with verified ESU coverage for any remaining devices.

Discover More

Sources

Take Your IT to the Next Level!

Book A Consultation for a Free Managed IT Quote

281-269-6506