It's also worth pointing out that all of those devices should be protected, too. Even if someone got in they can't do anything if the endpoints are locked down. Are devices configured securely? For instance, are you managing your printers with policy-based print security compliance tools? Are there firewalls in place? Are you monitoring network traffic for anomalies?
Karen Bannan for IDG and HP