sb-nz logo
Story image

Your printer is a ‘weak link’ and putting your organisation at risk right now

25 Jan 2017

Print security is once again in the spotlight, after new research revealed that 61% of enterprises have suffered an insecure printing data breach – despite print security being essential for data privacy compliance and maintaining business operations.

The research, conducted by Quocirca and Y Soft, surveyed more than 1000 responses across 200 enterprises.

48% are vulnerable to printer hard disk theft or retrieval; 50% of print jobs are intercepted on the print queue or network; 47% leave unclaimed print jobs on an output tray; 44% of documents are scanned from a multifunction device (MFD) to the outside world. 18% of those MFDs are not secure on the network.

“As organisations increasingly connect to the Internet of Things, their cyber-attack surface expands. Internet connected multifunction devices are one such endpoint that can be readily exploited, placing sensitive information at risk. Organisations need to ensure their printing is secure,” says Y Soft Australia’s managing director, Adam O’Neill.

Y Soft says that any multifunction device can be an internet-connected endpoint, making them vulnerable to cyber attacks. Document security should be imperative, given the financial, legal and reputational consequences.

“This requires a comprehensive approach that includes education, policy and technology. With the aid of a secure workflow management platform and employee training, implemented by a trusted provider, organisations can feel comfortable that their valuable data is protected,” O’Neill says.

Within the organisations, there are risks to sensitive data too, as it can be distributed in ways that can cause harm.

“Multifunction printers have long been a ‘weak link’ in organisations IT infrastructure. Businesses must smarten up and include print security in their risk assessment and overall security strategy. Deploying a secure workflow management platform is the best line of protection for organisations to control unwarranted access to their network and IP, while enhancing the employee print experience,” O’Neill says.

Story image
Security training and tech: Empowering staff in a hybrid work environment
As employees travel back and forth between home and the workplace, are they walking through the door with cyber threats sitting on their devices?More
Link image
Webinar: Best practices for keeping your video chats secure
Video collaboration providers nowadays operate exclusively on a multi-tenant, public cloud - and security and privacy concerns have come into the spotlight. Here's how to secure your communications.More
Story image
ConnectWise launches bug bounty program to bolster cybersecurity strategy
“Crowdsourcing in this way represents a solid additional layer of security, and we clearly value the community's expertise and participation in helping us keep our products secure."More
Link image
Track, analyse, act: The e-commerce metrics you need
E-commerce technology leaders need to track, analyze, and act on large volumes of business and system performance data. Danny Miles, the CTO of Dollar Shave Club, shares a powerful framework for thinking about and prioritizing e-commerce metrics.More
Story image
Remote staff overestimating knowledge of cybersecurity basics
‘Unconscious incompetence’ is one of the most difficult issues to identify and solve with security awareness training.More
Story image
Malware and email scams targeting employees spread rapidly in Q2
"Businesses must stay alert and should employ defense-in-depth tactics and equip themselves with multilayered security mechanisms, including high-sensor spam filters and a VPN connection, which would prevent malicious pages from opening."More