The 20 Riskiest Connected Devices Threatening Your Houston Business in 2026
Industry Risk Scores Vary Widely – Financial Services Leads the List – Network Infrastructure Replaced Endpoints as the Top Attack Target
Forescout's latest research reveals routers, VoIP systems, and medical
devices top the risk charts - and Houston businesses need to pay attention.
Forescout Research - Vedere Labs released their annual Riskiest Connected Devices report on March 23, 2026, and the findings should give every Houston business owner a reason to look harder at what's actually connected to their network. The report analyzed millions of devices using a multifactor risk scoring methodology that evaluates configuration weaknesses, device function criticality, and internet exposure.
The headline number: 11 new device types appeared on the risk list this year - the second-largest year-over-year shift on record. Attackers are not sticking to the same targets. They're expanding into device categories that most businesses don't monitor closely, including time clocks, RFID readers, and power distribution units.
CinchOps is a managed IT services provider based in Katy, Texas, serving small and mid-sized businesses across the Houston metro area. CinchOps specializes in cybersecurity, network security, managed IT support, VoIP, and SD-WAN for businesses with 10-200 employees.
The report breaks connected devices into four domains - Information Technology (IT), Internet of Things (IoT), Operational Technology (OT), and Internet of Medical Things (IoMT) - and ranks the top five riskiest in each. Of the 20 devices on the 2026 list, nine carried over from 2025. The other 11 are brand new entries.
| Rank | IT | IoT | OT | IoMT |
|---|---|---|---|---|
| 1 | Router | VoIP System | Power Distribution Unit (PDU) | Medication Dispensing System |
| 2 | Serial-to-IP Converter | Printer | Physical Access Control System | Medical Image Printer |
| 3 | Workstation | Time Clock | UPS | DICOM Gateway |
| 4 | Firewall | Network Video Recorder (NVR) | I/O Module | MRI Scanner |
| 5 | Domain Controller | RFID Reader | BACnet Router | Healthcare Workstation |
Three device types have appeared consistently since 2022: routers, VoIP systems, and UPS devices. Routers bounced back to the #1 IT spot after dropping to fifth in 2025 - they held the top position in 2024 and 2022 as well. VoIP systems climbed from third to first in IoT.
The new entrants tell the real story. Serial-to-IP converters, time clocks, RFID readers, PDUs, I/O modules, BACnet routers, medication dispensing systems, medical image printers, DICOM gateways, and MRI scanners all appeared for the first time. That's a signal: attackers are probing device categories that most security teams don't watch closely.
Network infrastructure devices overtook endpoints as the riskiest IT device category starting in 2024, and that trend accelerated in 2026. Forescout's 2025 Threat Roundup found that network infrastructure exploitation grew from 3% in 2022 to 19% in 2025, making these devices the second most exploited category overall.
Cyber Alert: Router Vulnerability Exposure
The numbers on routers are stark. They carry an average of 32 vulnerabilities per device and account for roughly a third of all critical-severity, high-exploitability vulnerabilities found across organizational networks. Firewalls also contribute a significant share. These devices sit at the network perimeter, often with exposed management ports, zero-day vulnerabilities, and outdated firmware that nobody has touched in months or years.
Weak or reused credentials on management interfaces make the problem worse. Brute-force attacks against router and firewall admin portals remain a common attack vector.
Serial-to-IP converters are a new addition worth watching. These devices bridge legacy serial interfaces (RS-232) to IP networks and show up across industrial control systems, building automation, and medical networks. They run with default credentials, rarely get patched, and can serve as pivot points between IT and OT environments. For Houston's manufacturing and oil and gas companies, these converters may be connecting production floor equipment to corporate networks right now without anyone flagging the risk.
"In 30 years of managing networks, the pattern is always the same - businesses lock down their laptops and servers but forget about the router in the closet running five-year-old firmware. That router is now the #1 target on the list, and it's sitting unpatched in thousands of offices across the Houston metro."
Is Your Network Equipment at Risk?
Most Houston businesses don't know the firmware version running on their routers and firewalls. We can find out in 15 minutes.
Schedule a Free AssessmentThe OT category saw the most turnover, with three new device types: power distribution units (PDUs), I/O modules, and BACnet routers. PDUs and UPS devices are present in every data center and server room. Modern PDUs are network-connected with remote management capabilities. CISA has specifically warned about attackers targeting UPS devices with default credentials to shut off power or damage sensitive equipment through voltage manipulation. The same attack scenarios apply to PDUs.
BACnet routers connect building automation networks and rank as the third most attacked OT protocol. For Houston construction companies and property managers operating smart buildings, these devices sit at the intersection of building controls and corporate IT. Poor segmentation means a compromised BACnet router could provide access to HVAC, lighting, badge access, and fire safety systems.
The medical device list changed significantly. Medication dispensing systems - known to be vulnerable since researchers documented 1,418 vulnerabilities on just seven third-party components of a single popular device nearly a decade ago - took the top IoMT spot. They commonly run outdated firmware.
Imaging-related devices broke into three separate entries: MRI scanners, DICOM gateways, and medical image printers. These devices run on legacy hardware and software, require extensive network connectivity, and are frequent targets. Forescout documented real-world campaigns where attackers scanned for exposed medical imaging systems and exploited weaknesses in DICOM applications to infect patient devices. For healthcare organizations in the Texas Medical Center and across the Houston metro, medical device security isn't optional - it's a HIPAA compliance requirement and a patient safety issue.
Healthcare and OT Environments Need Cross-Domain Visibility
Attackers don't respect network boundaries. Ransomware moves from IT workstations to OT systems to medical devices. Protecting your business requires security that spans all connected device categories, not just the ones running Windows.
Learn about CinchOps cybersecurity services →Forescout analyzed the five industries with the largest number of connected devices and found a stark gap. Financial services carried the highest average device risk, followed by government and healthcare. The difference isn't marginal - financial services risk was more than three times that of retail, and government risk was more than double that of manufacturing.
| Industry | Primary Risk Factor | Legacy Windows % | Telnet Exposure Trend |
|---|---|---|---|
| Financial Services | Highest overall device risk (3x retail); 65% traditional IT OS | 29% | 3% to 12% (biggest increase) |
| Government | 2x manufacturing risk; 72% special-purpose OS | ~25% | Slight decrease |
| Healthcare | 8% mobile OS (highest); imaging device concentration | 35% | 6% to 8% |
| Manufacturing | Traditional IT OS dominant; growing embedded device risk | Low | 5% to 12% |
| Retail | Highest legacy Windows at 39%; special-purpose OS at 61% | 39% | Slight decrease |
For Houston's CPA firms and wealth management practices, the financial services data is concerning. The highest overall risk score combined with a Telnet exposure jump from 3% to 12% means these organizations have both the most to lose and some of the fastest-growing gaps. Telnet transmits everything - including credentials - in plain text. There is no legitimate reason for a financial services firm to have Telnet running on 12% of its devices in 2026.
Operating system fragmentation adds another layer. Special-purpose operating systems (embedded firmware, networking OS) now dominate in government (72%), retail (61%), and healthcare (56%). These systems are hard to track, rarely patched automatically, and frequently running outdated or unsupported firmware. The devices most commonly running outdated firmware include label printers (26%), switches (19%), IP phones (12%), medication dispensing systems (11%), and standard printers (7%).
Windows 10 reached end of support on October 14, 2025, and the impact shows clearly in Forescout's data. Legacy Windows percentages increased across all five industries analyzed. Retail leads at 39%, followed by healthcare at 35% and financial services at 29%.
The report notes that across all five industries, more than half of non-legacy Windows devices had previously been running Windows 10. Organizations can enroll in Microsoft's Extended Security Updates (ESU) program, but Forescout can't determine which devices are actually covered. That uncertainty is itself a risk - if you don't know which machines are getting security patches and which aren't, you have a visibility gap that attackers will find before you do.
We see this pattern at least twice a month with businesses in the Cypress and Woodlands area. A company with 50 workstations assumes IT handled the Windows 11 upgrade, but a quick scan shows 15-20 machines still on Windows 10 without ESU coverage. Those machines are running unpatched, and each one is an open door.
Forescout tracked four commonly exploited protocols across industries: SMB, RDP, SSH, and Telnet. The most alarming finding is Telnet. Its usage increased in financial services, healthcare, and manufacturing - despite being an unencrypted protocol that should have been retired years ago. Financial services saw Telnet exposure jump from 3% to 12%. Manufacturing went from 5% to 12%. Healthcare climbed from 6% to 8%.
SSH and Telnet are rising across most industries, which signals growing exposure of OT and IoT infrastructure management interfaces. RDP and SMB have stabilized or declined in most sectors - a sign that traditional IT protocol hygiene is improving even as embedded device management falls behind.
Default credentials on management interfaces remain widespread. The device types most commonly configured with default passwords include printers, print servers, PLCs, and serial-to-IP converters. These aren't edge cases - these are devices in active use on production networks.
On the vulnerability front, the distinction between total vulnerabilities and dangerous vulnerabilities matters. Computers have the most vulnerabilities by volume (59% of all detected vulnerabilities). But when you filter for only critical-severity vulnerabilities with extreme exploitability scores, routers jump to #1 at 34%, followed by wireless access points at 23% and computers at 19%.
Routers average 32 vulnerabilities per device. Wireless access points and healthcare workstations average 18 each. Computers average 14. The takeaway: your router has more than twice as many vulnerabilities per device as the average workstation, and the vulnerabilities it carries are more likely to be weaponized.
Connected Device Security Self-Assessment
- Do you know the firmware version running on every router, switch, and firewall on your network?
- Have you changed the default credentials on all printers, VoIP phones, and network-connected devices?
- Is Telnet disabled on all devices where SSH is available as an alternative?
- Are your IoT and OT devices on segmented network segments, separate from workstations and servers?
- Have all Windows 10 machines been upgraded to Windows 11 or enrolled in Microsoft's ESU program?
The Forescout report makes one thing clear: security that only covers laptops and servers misses the devices attackers are actually targeting. CinchOps provides managed IT and cybersecurity services that address the full range of connected devices in your environment - from routers and firewalls to VoIP phones, printers, and OT equipment.
- Network Device Audit and Hardening - We inventory every connected device on your network, identify outdated firmware, default credentials, and exposed management ports, then remediate the gaps before attackers find them.
- Network Segmentation - IoT devices, OT equipment, and guest Wi-Fi belong on isolated network segments. We design and implement segmentation that limits lateral movement if any single device is compromised.
- Firmware and Patch Management - Routers, switches, firewalls, VoIP phones, and printers all need regular firmware updates. We track versions across your entire device inventory and apply patches on a managed schedule.
- Windows 10 Migration Support - We handle the full transition from Windows 10 to Windows 11, including hardware assessment, data migration, and application compatibility testing. No machine gets left behind unpatched.
- Continuous Monitoring and Threat Detection - Our managed security services monitor network traffic for signs of compromise across all device types - not just endpoints. If an attacker brute-forces a router admin panel or pivots through a printer, we catch it.
- Credential Hygiene Enforcement - We audit and replace default credentials across all network-connected devices, enforce strong password policies on management interfaces, and implement multi-factor authentication where supported.
Businesses across Houston, Katy, Sugar Land, and Cypress trust CinchOps to keep their connected devices secure, patched, and properly segmented. The attack surface is bigger than it was last year - and it's only getting wider.
Frequently Asked Questions
What are the riskiest connected devices in 2026 according to Forescout?
Forescout's 2026 report identifies routers as the riskiest IT device, VoIP systems as the riskiest IoT device, power distribution units as the riskiest OT device, and medication dispensing systems as the riskiest medical device. Routers carry an average of 32 vulnerabilities per device and account for 34% of the most critical vulnerabilities found on enterprise networks.
Why are routers and firewalls a bigger target than computers?
Computers have more total vulnerabilities, but routers and firewalls concentrate the most dangerous ones - critical severity with extreme exploitability scores. Network infrastructure devices sit at the perimeter with exposed management ports, outdated firmware, and weak credentials. Forescout found that network infrastructure exploitation grew from 3% of attacks in 2022 to 19% in 2025.
Which industries face the highest connected device risk?
Financial services carries the highest average device risk in Forescout's 2026 dataset, with risk scores more than three times higher than retail. Government ranks second at more than double the manufacturing average. Healthcare ranks third, driven by legacy Windows devices, mobile OS complexity, and vulnerable medical imaging equipment.
How does the end of Windows 10 support affect device security?
Windows 10 reached end of support on October 14, 2025, and legacy Windows percentages increased across all industries in Forescout's data. Retail has 39% legacy Windows devices, healthcare has 35%, and financial services has 29%. Devices not enrolled in Microsoft's Extended Security Updates program no longer receive security patches for newly discovered vulnerabilities.
What should Houston businesses do to reduce connected device risk?
CinchOps recommends five immediate actions: audit and update firmware on all routers, switches, and firewalls; change default credentials on every network-connected device including printers and VoIP phones; disable Telnet wherever SSH is available; segment IoT and OT devices onto isolated network segments; and complete Windows 10 to Windows 11 migrations with verified ESU coverage for any remaining devices.