Taming the security monster in your printer
Canva

Taming the security monster in your printer

When the subject of security comes up, most businesses focus on their everyday devices such as PCs, laptops, tablets and smartphones. More often than not, printers are completely ignored. It is for this very reason that printers are an attractive target for cybercriminals. Modern network- connected printers feature a processor, memory, storage and even a web server. This makes them powerful enough to host specially-crafted malware that can access your network. The potential risk that they will obtain confidential information or do other destructive activities is steadily increasing.

Printers have highly confidential information flowing through them all day long.

Businesses that use the eight tips listed below will decrease the risk that their printers will be “hacked” by either employees or cyber thieves.

Physical security

Install printers in a physical location that is secure. This way print jobs are less likely to simply “walk away.” One of the easiest ways to steal a company’s information is to grab printed documents off printers before the owner retrieves them. It is surprising how many shared printers are accessible by the casual guest or temporary employee.

Push-Pull Printing

If supported by the printer, using the push-pull feature can eliminate disappearing print jobs. This feature will hold them until the requester walks to the printer and enters a code which starts the printing. This ensures that the output is securely delivered to the intended person. It can also end having to buy printers for special functions like payroll.

Change Passwords

Most new printers include a web-based administration page that administrators access through a web browser. Change the default password used for accessing this web page immediately. This ensures that a cyber crook can’t access the printer administrator web page by using the default password. It is easy to find this information with a simple online search. Make the password “long and strong” so it is difficult to crack.

Require Printer Authentication

After changing the default administrative password a best practice is to password protect printer access by using directory services or a print server that manages the printer--or both. Password protection adds another layer of printer security, so that only those approved by the company can generate print jobs. This substantially decreases the potential for network compromise.

Secure Print Data

Encrypting printer data is essential to preventing network eavesdropping and theft of information stored on the printer. This may be the last line of defense against a determined hacker so don’t shy away from using this feature. It can also prevent having to disclose a breach if you are certain the printer was in use during an attack.

Update Firmware

Run only the most current firmware and check for updates often. Updates regularly include security improvements that will eliminate known vulnerabilities that are exploited by malware or hackers.

Configure Printers to Purge Data

Printers store information temporarily before and during printing and usually have settings which dictate how long the printing information remains in the memory. By configuring all printers to immediately purge print job information, you reduce the possibility of stolen confidential information long after the job is completed.

Remove and Destroy Printer Storage before Recycling

To be absolutely certain no printed data is stolen, remove and destroy the hard drive in your printer before shipping it off to the recycle center. If you need a certificate of destruction for your records, contact your shredding company as they can often issue one. 

Printers are an attractive target for cybercriminals because they have highly confidential information flowing through them all day long. Lax security makes these devices an easy target. NPI Technology Management has a strong focus on security; rely on our expertise to control these and other security vulnerabilities.

John Burton

Director of Research for the Vermont Futures Project

7 年

Who would have thought we would have to worry that our printers would attack us? Are your printers secure?

回复
Dawn McGinnis

Business Development | Marketing | Consulting

7 年

Cyberthieves are always looking for new vulnerabilities.

回复

要查看或添加评论,请登录

John Burton的更多文章

  • Ever wonder what a CIO does?

    Ever wonder what a CIO does?

    1 条评论
  • Think your business is too small for cyber insurance?

    Think your business is too small for cyber insurance?

    The general perception is that only large businesses have vulnerabilities to cyber breaches. In truth, small businesses…

    2 条评论
  • Preventing Business Banking Fraud Part II

    Preventing Business Banking Fraud Part II

    Any private data your business possesses, company and personal, can be predisposed to fraud. Is your organization…

  • 2 Looming Cybersecurity Deadlines for Government Subcontractors

    2 Looming Cybersecurity Deadlines for Government Subcontractors

    12/31/17 – The latest date that contractors and subcontractors can continue to maintain and receive new defense related…

    1 条评论
  • Deadline fast approaching for DOD manufacturers

    Deadline fast approaching for DOD manufacturers

    As you may know, many manufacturers with DOD contracts must be compliant with new cyber security requirements…

    1 条评论
  • Facing an IT Audit? Don’t Panic.

    Facing an IT Audit? Don’t Panic.

    IT audits are one of many tools to help manage risk and identify areas of your business that are not only open to…

    2 条评论
  • Do you trust your business continuity plan?

    Do you trust your business continuity plan?

    All businesses--regardless of size--have a digital presence. This mandates that both mundane and mission critical data…

    5 条评论
  • Hard to Cry for the WannaCry Victims

    Hard to Cry for the WannaCry Victims

    The WannaCry ransomware attack ended up causing tens of millions of dollars of damage when it encrypted important data…

    4 条评论
  • Discovering value at business trade shows

    Discovering value at business trade shows

    This post was written by our Marketing Coordinator Dawn McGinnis who is a veteran trade show exhibitor. If you try…

    3 条评论
  • Arrest bogus wire fraud

    Arrest bogus wire fraud

    Business owners are seeing a huge increase in attempted wire fraud. The FBI reports that this problem has cost…

    5 条评论

社区洞察