Story image

The humble printer: A useful tool – and a security risk

22 Sep 2017

Every new device that is connected to a network brings new risks into organisations through more potential entry points into corporate network and more opportunities to gain unauthorised access, according to Y Soft.

This is especially the case as the Internet of Things and connected devices grows. Before plunging headfirst into adoption of all these technologies, organisations need to control the growth by taking what Y Soft calls a sophisticated approach to cybersecurity.

“Businesses and people are well aware of the need to secure desktop and laptop computers, and most business users have a password on their smartphone. But businesses seem to overlook a key area of potential vulnerability: the networked printer. This vulnerability isn’t just theoretical. In fact, a recent report suggested that more than 60 per cent of large enterprises have already suffered at least one data breach through insecure printing,” comments Y Soft Australia’s managing director, Adam O’Neill.

Some print management and hardware offerings on the market come with strong security features and authentication requirements. These can be as simple as making sure only authorised users can access the printer and printouts.

The company also says that businesses should educate staff about the need for a strong security posture, including coverage of the risks networked printing and mobile printing both pose.

O’Neill believes that organisations are subject to many different legislations that cover disclosure of private or sensitive information.

In Australia, the Privacy Act requires businesses to be responsible for protecting personal information about people. Breaches carries potential fines and in some cases, organisations must notify the Australian Information Commissioner if a breach has occurred.

“The cost of a data breach can be significant in terms of fines and lost business, as well as the ongoing damage to the business’s reputation. There is a clear business imperative to make sure systems are secure and data is safe. Consequently, organisations must include print security as a key pillar of their overarching cybersecurity strategies,” O’Neill comments.

“Security is strongest in organisations that have an ingrained culture of security. Businesses need to build that culture across all elements of their network and infrastructure, remembering that printers form a key part of that infrastructure. While networked printers do present a vulnerability, businesses can take simple steps to secure them and close the gap,” O’Neill concludes.

Unencrypted Gearbest database leaves over 1.5mil shoppers’ records exposed
Depending on the countries and information requirements, the data could give hackers access to online government portals, banking apps, and health insurance records.
SAS announces US$1 billion investment in AI
"At SAS, we remain dedicated to our customers and their success, and this investment is another example of that commitment."
Two Ministers’ thoughts on blockchain in Oz
Minister Karen Andrews, and Minister Simon Birmingham have released a joint statement on the national blockchain roadmap and extra $100,000 funding.
IntegrationWorks continues expansion with new Brisbane office
The company’s new office space at the Riverside Centre overlooks the Brisbane River and Storey Bridge.
DXC subsidiary takes SAP energy industry partner award
Winners of the awards were selected from SAP’s A/NZpartner ecosystem and announced at the recent SAP A/NZ Partner Kick-Off Meeting held in Sydney.
NetApp and allegro.ai showcase an integrated solution for deep learning
Unlike traditional software, in deep learning, the data rather than the code is of the utmost importance.
Opinion: Moving applications between cloud and data centre
OpsRamp's Bhanu Singh discusses the process of moving legacy systems and applications to the cloud, as well as pitfalls to avoid.
Workflows should benefit people, not devices
It is important that, in digital transformation journeys, managers remember technology should complement, rather than overtake, employee talent and skillsets.