Story image

Unsecure print services equals unsecure IT, expert says

18 Aug 2016

Information leaks from inside an organisation remains an inherent risk despite most businesses spending millions to ensure the security and privacy of sensitive information.

Adam O’Neill, managing director, Australia, Y Soft, says that while most businesses know that securing data in the enterprise is important, there are some risks businesses may not have considered.

“Every day organisations are at risk of a potential document security risk that they may not have even thought of – the multifunction printer,” O’Neill states.

“It prints, scans and copies an organisation’s most sensitive information, and may be the place where all previous security efforts are rendered useless because confidential data is going undetected,” he explains. 

“Ultimately unsecure print services equals unsecure IT,” says O’Neill.

“Unintentionally, employees in the office send documents to the printer but forget to pick them up. Or, the print job is picked up right away, but with a few pages from someone else’s print job.”  O’Neill says the same attention to security that is afforded to other IT and tools is needed for document handling.

“By using a print management solution, organisations can enforce safe print governance policies, which can increase document security,” he says. 

Three steps to increase document security 

1. Secure access to multifunction and networked printers. 

As with any valuable company property, access to print, copy and scan services should be limited to authorised employees. Set up access through a card reader or entry of username/password, PIN or any combination depending on the level of security you require. When employees send a job to the printer from their workstation or a mobile device it won’t print out until they get there, which means it is only collected by the rightful owner. 

2. Ensure your print governance includes documenting a print, copy and scan audit trail. 

An audit trail identifies who handled which documents and, in the case of scans, where they were sent. Print administrators can create reports from their print management system to identify individuals, groups or cost centres and the print services behaviours of each. In case a sensitive document is at the centre of a security breach, an audit trail will be crucial to track the source. 

3. Control where scans are distributed. 

Pre-program scans to a particular secure file location or into approved third-party applications and disallow scans to unauthorised email addresses or personal folders. 

“Using an enterprise print management and document capture solution provides a security layer to address human behaviour and habits, and the physical security of documents to ensure that sensitive information is protected,” O’Neill says. 

Gartner: Local server revenue up by a quarter, shipments down
In Australia, server revenue increased 24.7% in 4Q18, while shipments declined 5.3%.
Unity and NVIDIA announce real-time ray tracing across industries
For situations that demand maximum photorealism and the highest visual fidelity, ray tracing provides reflections and accurate dynamic computations for global lighting.
NVIDIA announces Jetson Nano: A US$99 tiny, yet mighty AI computer 
“Jetson Nano makes AI more accessible to everyone, and is supported by the same underlying architecture and software that powers the world's supercomputers.”
Slack doubles down on enterprise key management
EKM adds an extra layer of protection so customers can share conversations, files, and data while still meeting their own risk mitigation requirements.
How Dotscience aims to deliver end-to-end governance
NGC is supposedly the hub of GPU-optimised software for deep learning.
HPE launches 'right mix' hybrid cloud assessment tool
HPE has launched an ‘industry-first assessment software’ to help businesses work out the right mix of hybrid cloud for their needs.
Security professionals want to return fire – Venafi
Seventy-two percent of professionals surveyed believe nation-states have the right to ‘hack back’ cybercriminals.
Alcatraz AI to replace corporate badges with AI security
The Palo Alto-based startup supposedly leverages facial recognition, 3D sensing, and machine learning to enable secure access control.