Story image

Your printer is a ‘weak link’ and putting your organisation at risk right now

25 Jan 2017

Print security is once again in the spotlight, after new research revealed that 61% of enterprises have suffered an insecure printing data breach – despite print security being essential for data privacy compliance and maintaining business operations.

The research, conducted by Quocirca and Y Soft, surveyed more than 1000 responses across 200 enterprises.

48% are vulnerable to printer hard disk theft or retrieval; 50% of print jobs are intercepted on the print queue or network; 47% leave unclaimed print jobs on an output tray; 44% of documents are scanned from a multifunction device (MFD) to the outside world. 18% of those MFDs are not secure on the network.

“As organisations increasingly connect to the Internet of Things, their cyber-attack surface expands. Internet connected multifunction devices are one such endpoint that can be readily exploited, placing sensitive information at risk. Organisations need to ensure their printing is secure,” says Y Soft Australia’s managing director, Adam O’Neill.

Y Soft says that any multifunction device can be an internet-connected endpoint, making them vulnerable to cyber attacks. Document security should be imperative, given the financial, legal and reputational consequences.

“This requires a comprehensive approach that includes education, policy and technology. With the aid of a secure workflow management platform and employee training, implemented by a trusted provider, organisations can feel comfortable that their valuable data is protected,” O’Neill says.

Within the organisations, there are risks to sensitive data too, as it can be distributed in ways that can cause harm.

“Multifunction printers have long been a ‘weak link’ in organisations IT infrastructure. Businesses must smarten up and include print security in their risk assessment and overall security strategy. Deploying a secure workflow management platform is the best line of protection for organisations to control unwarranted access to their network and IP, while enhancing the employee print experience,” O’Neill says.

Interview: Culture and cloud - the battle for cybersecurity
ESET CTO Juraj Malcho talks about the importance of culture in a cybersecurity strategy and the challenges and benefits of a world in the cloud.
Enterprise cloud deployments being exploited by cybercriminals
A new report has revealed a concerning number of enterprises still believe security is the responsibility of the cloud service provider.
Ping Identity Platform updated with new CX and IT automation
The new versions improve the user and administrative experience, while also aiming to meet enterprise needs to operate quickly and purposefully.
Venafi and nCipher Security partner on machine identity protection
Cryptographic keys serve as machine identities and are the foundation of enterprise information technology systems.
Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Seagate: Data trends, opportunities, and challenges at the edge
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.
How blockchain could help stop video piracy in its tracks
An Australian video tech firm has successfully tested a blockchain trial that could end up being a welcome relief for video creators and the fight against video piracy.