//////////////// COMPROMISED DEVICES HARDWARE HACKING DANGERS By John Murph W hen the topic of cybersecurity comes up, most people think of protecting highly sensitive data using elaborate network security systems. Effective cybersecurity protocols, however, require more than firewalls and antivirus software. Physical devices such as printers and smartphones, server rooms, and even cars must be equally safeguarded, according to Matthew Ferrante of Withum Smith & Brown PC, a technology-driven advisory and accounting firm. In fact, it is wise for law firms and legal professionals to look at all of those devices less as accessories and more as computers. 24 WASHINGTON LAWYER * OCTOBER 2019