HP's printers and consumables, does the seal protect your business?
In recent years, with the continuous evolution of office space, printers have gradually evolved into "networked MFPs" and become an important part of the IT infrastructure. Today, most multifunction printers have the same storage capabilities as computers—from employee records to credit card numbers and patient cases, which record every document scanned, copied, and printed.
Yang Zijiang, Marketing Development Manager, Hewlett-Packard's Printers and Consumables Division
In this way, like a networked computer and a smart phone, the printer has become a terminal device that can be invaded by an attacker for the vandals who attempt to invade the data. If the security risk is caused by the failure to protect the printer, it will cause the enterprise to spend a lot of manpower and resources to build and maintain the security protection infrastructure is facing collapse, resulting in huge waste.
In general, IT decision makers in most enterprises pay attention to the information security risks faced by computers, and have developed comprehensive security measures – from firewalls to intrusion detection systems to hacker attacks. Unfortunately, when IT managers deploy and consider corporate information security issues, printers are very easy to become an important part of their neglect.
In addition, because the printing device has wireless/wired capabilities, it not only becomes a convenient entry point for malicious attacks by malicious software and viruses, but its embedded operating system and complete IP stack also means that hackers can remotely access the printer hard disk and control its storage. The data.
Strict situation, strong print protection, need to be vigilant
Peter Kim, a well-known penetration tester and hacker in the industry, pointed out in his book "Bad Tip 2: A Practical Guide to Penetration Testing" that it is very easy to implement cybercrime through a printer. He once used a printer as a breakthrough point to break through a series of companies. Information security defense system.
In addition, data from the Ponemon Institute, a market research organization, also showed that 60% of respondents have experienced data breaches involving printers1. At the same time, in a survey conducted by IDC, more than a quarter of respondents pointed out that printers are major IT security vulnerabilities that need to be fixed; more than 25% of security incidents involve printers2.
A series of recent real-life cases highlights how easy it is to implement a cyber attack through a printer. Due to hacker's long-range attacks, flyers with offensive content appeared mysteriously in 29,000 printer output trays on multiple university campuses in the United States. In August of this year, this attack happened again, but this time the number almost doubled - 50,000 printers were attacked. Similarly, in a cybersecurity incident in November 2015, a laser printer was found to be sending SSL traffic.
Although the above problems were finally solved, the reason why the printer became the most vulnerable attack point is the lack of attention to its security protection. In fact, less than 44% of IT managers have included printers in their security strategy, while less than 50% of users use the printer's “manage password†feature3.
Take action to protect the seal protection
The above cases and data are warning us that in the evolving office environment, printer security vulnerabilities may only increase. As a printer that is part of the overall IT infrastructure, organizations must take immediate steps to protect and securely deploy them.
In the Australian Government Information Security Handbook issued by the Australian Department of Defense, printers have been included in ICT equipment and communication media that require protection4.
In Singapore, the government has established a cybersecurity agency to clarify the importance of cybersecurity. Print security will also be increasingly incorporated into the overall development of corporate information security strategies.
So, how do you effectively protect print security? Here are some key guidelines for securing printer workgroups:
· First, conduct a comprehensive security assessment of the current printer workgroup to understand its security status. Make sure the printer workgroup is incorporated into your company's security policy.
· If there is a security operations center, the printer should be monitored to provide early warning of possible threat events.
· Implement and regularly review security policies to incorporate print management service providers into the framework of supplier risk management.
In order to fully protect the information security of enterprises, it is imperative to conduct risk assessment of printing security and implement deployment and management in advance of possible problems. Therefore, when you purchase a printer, you may ask questions and requirements to the printer provider: What is the current security status of the printer working group? How much risk is there? How can it be solved?
Document protection, no time to delay!
Source: Third Media
Foot File Stainless Steel-Mini
Foot File Stainless Steel-Mini,Cheap Foot Files,Foot Scraper,Professional Foot Scraper
SZ CHENGYANG BEAUTY TOOLS CO.,LTD , https://www.cyfootfile.com