Hackers know your printers’ vulnerabilities. Do you?

11/04/20171 Minute Read

Although IT managers may overlook printers as a primary security risk, they can be a hidden target for cyberattacks and internal threats.

Follow these steps to get started.

1. Review your security policy.

The first step to improving your network’s print security is to review your existing security policy and make sure all of your current procedures — and stakeholders — are aligned. Based on this review, you can determine the size and scope of your security needs.

2. Make note of every connected device.

What’s crucial to keep in mind when reviewing your current policy is to ensure every device touching your network — from smart vending machines and connected coffee makers to printers and PCs — is known and configured for security. Otherwise, you risk compromising the entire system.

3. Assess your network vulnerabilities.

Prioritize your security strategies considering how printers are used in your business. Who in your organization prints confidential documents and customer data? Are you able to track who scans and faxes from multifunction printers (MFPs)? Are you able to set and maintain the security configuration of your printers? Do users print from mobile devices? Are sensitive print jobs left exposed at the printer?

4. Protect your devices, data and documents.

Print security goes beyond configuring the printer. Your plan needs to include addressing the data that travels to and from the printer, plus sensitive information in hard-copy documents. Monitoring and management tools can help you identify vulnerabilities and establish a united, policy-based approach to reducing risk and strengthening compliance.

Take the HP Secure Print Analysis at www.hp.com

Daniel Tay 25/09/2018 3 Minute Read

Black Hat Asia 2018: Is AsiaPac ready for new cyber attacks?

At Black Hat Asia 2018, it was clear how far information security needs to advance to keep up with modern cyber attacks. All IT pros, listen up.

Michael Howard 19/07/2018 3 Minute Read

Stay proactive—3 ways to adopt a holistic approach to IT security

Still think firewalls and point solutions are good security measures? Hackers think otherwise. Take a holistic approach to IT security with these 3 steps.

Anthony Caruana 17/07/2018 5 Minute Read

The most pressing IT security concerns by industry

IT security concerns aren't the same across industries. Every vertical is a little different. Here's a quick look at what that means.

Leave a Comment

Your email address will not be published. Required fields are marked *