TechnoclinicTechnoclinic
  • Home
  • APPS
  • CAMERAS
    • PRINTERS
  • GAMING
    • LAPTOPS
  • HDTV
  • NEWS
  • PHONES
    • TABLETS
  • REVIEWS
  • SOFTWARE
  • Contact Us!
Search
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Reading: Is the Office Printer the Weakest Spot in Your ‘Secure’ Corporate Network?
Share
Sign In
Aa
TechnoclinicTechnoclinic
Aa
Search
  • Home
  • APPS
  • CAMERAS
    • PRINTERS
  • GAMING
    • LAPTOPS
  • HDTV
  • NEWS
  • PHONES
    • TABLETS
  • REVIEWS
  • SOFTWARE
  • Contact Us!
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Technoclinic > PRINTERS > Is the Office Printer the Weakest Spot in Your ‘Secure’ Corporate Network?
PRINTERS

Is the Office Printer the Weakest Spot in Your ‘Secure’ Corporate Network?

Loknath Das
Last updated: 2017/05/31 at 4:27 PM
Loknath Das
Share
SHARE

Is the Office Printer the Weakest Spot in Your 'Secure' Corporate Network?

HIGHLIGHTS

  • Printers can be a point of entry to your network for hackers
  • Data can also be compromised between devices and printers
  • Protecting actual printed documents is another important issue

Is the printer in your office a ticking time bomb from the perspective of security? That’s what both HP and Xerox, two of the leading companies offering managed print services to enterprises say.

“No one is interested in hacking the printer itself – but rather, the network, and the printer is a soft target,” says Raj Kumar Rishi Senior Director, Printing Systems, HP India “The printers that sit on the network today are now high-end devices with processors, hard drives, ports and firmware, that are responsible for huge amounts of data to the printer and from it. You can go to a multi-function device (MFD), scan a document, and email it from there. It’s not just about receiving data to print, but can also send data from the MFD.”

“Unfortunately, CIOs are not really looking at printers as an area of concern,” he adds. “The level of concern about security breaches puts the PC and the server as a concern area, but only a few look at the printer as a concern area.”

Balaji Rajagopalan, Executive Director – Technology, Channels & International Business, Xerox India, largely agrees with this point of view, adding that at Xerox, the goal is to ensure that the printing solutions it provides do not cause problems on the customer network.

“The machines are Internet linked, and can be accessed remotely,” he points out. “Someone could ‘see’ the documents being printed. To deal with this, we partner with all the industry players, we have certifications from Microsoft, Adobe, and all the industry leaders.”

Part of the challenge can be the fact that these solutions are often not a one-step one-size-fits-all scenario. “You will be dealing with a large number of devices, many machines across many generations, and even from multiple manufacturers,” says Rajagopalan. Getting this to work together while complying with security norms is the issue. Things are further complicated by the bring-your-own-device (BYOD) trend, adds HP’s Rishi.

006 HP woman security card at printer ID printer

“In an office, a stranger can’t just walk in and start working on someone’s PC or laptop,” he says, “but today, with guest Wi-Fi that’s connected to the printers, something like that is possible. BYOD means that you have to be able to support new devices at will, and there’s no standardisation to prepare for, there’s a much greater threat profile.”

It’s not just the networks that are at risk though. Even if the printer does not compromise the rest of the network, if the printer can be accessed, a lot of sensitive data could potentially be at risk. Rishi recalled an example of how in a university, the printer was attacked, and as report cards were being printed, the data was unsecured along the way. “The report cards were edited and the wrong information was printed, causing huge problems,” he tells us. To get around this, he says, HP’s enterprise printers now use end-to-end encryption of documents by default.

Xerox’s Rajagopalan says that the company also stores scans on secure partitions so that they can’t be accessed without proper authorisation, but he points out that there is one more risk area as well – printouts that are not secured, meaning anyone can pick them up.

“A number of times, an employee might order a printout and then not collect this,” he says. “And this is a real risk. If it is confidential data and you have printed it out but don’t collect it, someone else might pick it up and you may not even know.” To get around this, Xerox implemented access controlled security printing, and HP has also taken similar steps.

“All our enterprise printers now have built-in security features,” adds HP’s Rishi. “We call it a 3D strategy, for Device, Data, and Document. These are now standard features of our networked MFDs.”

“On the device, the BIOS comes with special security features, and it is ‘self-healing’, to protect from attacks,” he ays. “Data is secured through encryption. And document means preventing unauthorised access to printed documents. So, the print isn’t sent to output until you’ve come to the printer and entered your security code, for example.”

These measures can help to protect your network from intrusion, and documents from being accidentally shared by careless employees, but ultimately there’s no simple solution to the problem. But both HP and Xerox say that security is among the biggest issues, and will continue to be a key focus area going forward.

For the latest tech news and reviews, follow Gadgets 360 on Twitter, Facebook, and subscribe to our YouTube channel.

Tags: HP, Xerox, Managed Print Services, Security, Networks, Hacking, Printers
[“Source-ndtv”]
TAGGED: Corporate, in, is, Network, Office, printer, Secure, Spot, The, Weakest, Your

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
[mc4wp_form]
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Loknath Das May 31, 2017
Share this Article
Facebook Twitter Copy Link Print
Share
Previous Article OnePlus 5 Retail Box Design to Be Chosen by Users, as Company Puts Up Poll
Next Article Xiaomi Mi Router 3C Review

Latest News

Case Study: Nissan and Teads’ Immersive Concept Car Campaign Transformed Scrolls into Stories
NEWS
Review of Hootsuite: Advantages, Drawbacks, Features, and Other Options
REVIEWS
From Idea to Launch: The Software Development Journey
SOFTWARE
How schools can save money and work more efficiently with managed print services
PRINTERS
How to Write Powerful Blog Posts, Comparisons, and Reviews
REVIEWS
How to Defrost Your Lens with Condensation
CAMERAS

Most Viewed Posts

  • Choosing the Right Tablet for Blogging and Writing On the Go (1,050)
  • What You Need to Know About Smartphones vs. Tablet use of the Mobile Internet (998)
  • How To Start A Review Blog and Get Free Review Products (995)
  • How to Start a Product Review Blog (Templates & Examples) (994)
  • App Annie now tracks 5,000 Android apps in China: Report (984)

© 2023 TechnoClinic Network. TechnoClinic Company. All Rights Reserved.

Removed from reading list

Undo
Welcome Back!

Sign in to your account

Lost your password?