The Quick-Start Guide to Print Security. How to maximize your print environment and minimize security threats

Similar documents
IT & DATA SECURITY BREACH PREVENTION

Securing Wireless Mobile Devices. Lamaris Davis. East Carolina University 11/15/2013

The Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management

Mobility, Security Concerns, and Avoidance

Managing EUC Threats. 3 Simple Ways To Improve Endpoint SECURITY

Auditing Bring Your Own Devices (BYOD) Risks. Shannon Buckley

A Guide to Closing All Potential VDI Security Gaps

10 Hidden IT Risks That Might Threaten Your Business

Xerox FreeFlow Print Server. Security White Paper. Secure solutions. for you and your customers

SECURING YOUR BUSINESS INFRASTRUCTURE Today s Security Challenges & What You Can Do About Them

Protect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com

Best Practices in Securing a Multicloud World

Securing Health Data in a BYOD World

Protect Yourself Against VPN-Based Attacks: Five Do s and Don ts

The security challenge in a mobile world

Make security part of your client systems refresh

Enterprise Mobility Management

Why you MUST protect your customer data

DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL. June 14, 2018

Encrypting PHI for HIPAA Compliance on IBM i. All trademarks and registered trademarks are the property of their respective owners.

Mobile App Security and Malware in Mobile Platform

Next Generation Authentication

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

Xerox and Cisco Identity Services Engine (ISE) White Paper

The Problem with Privileged Users

MOBILITY TRANSFORMING THE MOBILE DEVICE FROM A SECURITY LIABILITY INTO A BUSINESS ASSET E-BOOK

EBOOK 4 TIPS FOR STRENGTHENING THE SECURITY OF YOUR VPN ACCESS

Find Hidden Budget Dollars with PDF Software. How making a software switch can improve your bottom line

BIG DATA INDUSTRY PAPER

HP JetAdvantage Solutions

2018 Mobile Security Report

NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT?

Samsung SecuThru Lite Cost-effectively print documents without risking sensitive data

Six Ways to Protect your Business in a Mobile World

Cyber Security Updates and Trends Affecting the Real Estate Industry

Why Machine Learning is More Likely to Cure Cancer Than to Stop Malware WHITE PAPER

Perfect Balance of Public and Private Cloud

Sage Canadian SMB Survey on Mobile Devices March 2013

A Practical Step-by-Step Guide to Managing Cloud Access in your Organization

THALES DATA THREAT REPORT

How to Enable and Secure in the Next Stage of BYOD: Reap the Benefits of Bring Your Own Laptop

TREND MICRO SMART PROTECTION SUITES

UNLOCKED DOORS RESEARCH SHOWS PRINTERS ARE BEING LEFT VULNERABLE TO CYBER ATTACKS

Seven secrets to making the most of your computer system. Chris Jeffery Proprietor/Chief Guru CyberGuru

A Panel Discussion 1

Mobile Security / Mobile Payments

Mobile Device Management: A Real Need for the Mobile World

Train employees to avoid inadvertent cyber security breaches

Healthcare HIPAA and Cybersecurity Update

How to Build a Culture of Security

Securing Today s Mobile Workforce

Agenda. BYOD, Texting & Social Media How to Keep BYODFrom Becoming OMG! Introduction BYOD Defined Trends By the Numbers

CRITICAL INFRASTRUCTURE AND CYBER THREAT CRITICAL INFRASTRUCTURE AND CYBER THREAT

Xerox ConnectKey. The ecosystem for workplace productivity.

Streamline IT with Secure Remote Connection and Password Management

Chapter 12. Information Security Management

Survey Guide: Businesses Should Begin Preparing for the Death of the Password

BIG IDEAS FOR SmAll BuSInESS:

The Credential Phishing Handbook. Why It Still Works and 4 Steps to Prevent It

WHITE PAPER. ENSURING SECURITY WITH OPEN APIs. Scott Biesterveld, Lead Solution Architect Senthil Senthil, Development Manager IBS Open APIs

WHITE PAPER. The General Data Protection Regulation: What Title It Means and How SAS Data Management Can Help

Trustlook Insights Q BYOD Trends & Practices

IBM Cloud Internet Services: Optimizing security to protect your web applications

The Dropbox Problem: It s Worse than You Think

DIGITAL LIFE E-GUIDE. A Guide to 2013 New Year s Resolutions

- Samsung Tablet Photo - Tablets Mean Business. Survey of IT pros reflects growing trend toward tablets for workforce mobility and more

Victorious warriors win first and then go to war, while defeated warriors go to war first and then seek to win. Sun Tzu, The Art of War

BIG OFFICE FEATURES. SMALL OFFICE PACKAGE.

BYOD: BRING YOUR OWN DEVICE.

Date Approved: Board of Directors on 7 July 2016

SIEM: Five Requirements that Solve the Bigger Business Issues

Sales Presentation Case 2018 Dell EMC

Security Using Digital Signatures & Encryption

QUICK WINS: Why You Must Get Defensive About Application Security

ANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation

ALTITUDE DOESN T MAKE YOU SAFE. Satcom Direct s Comprehensive Cyber Security Portfolio for Business Aviation

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015

TREND MICRO SMART PROTECTION SUITES

ForeScout ControlFabric TM Architecture

What is ISO ISMS? Business Beam

BYOD: A Global Perspective

Complete document security

Welcome to Worldpay Gateway Services

DeliverySlip for Small & Medium Businesses

SOLUTION BRIEF RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK

Employee Security Awareness Training

Bring your own device: a major security concern

Data Protection Policy

Balancing BYOD and Security. A Guide for Secure Mobility in Today s Digital Era

Artificial Intelligence Drives the next Generation of Internet Security

Mobilizing Your Workforce for Success

2017 Annual Meeting of Members and Board of Directors Meeting

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

Next Generation Privilege Identity Management

Protecting Health Information

ENDPOINT SECURITY WHITE PAPER. Endpoint Security and the Case For Automated Sandboxing

Multi-Platform Enterprise Mobility Management. Perfectly balancing end-user and corporate needs

Business White Paper. Healthcare IT In The Cloud: Predicting Threats, Protecting Patient Data

Protect Your Data the Way Banks Protect Your Money

Transcription:

The Quick-Start Guide to Print Security How to maximize your print environment and minimize security threats

2 The Hidden Security Threat What s the first thing that comes to mind when you hear the words IT security? If you re like most people, you ll probably think of malware, email scams and passwords that are easy to crack. Or maybe the high-profile cases of hacking we ve seen in recent years, involving millions of users credit-card numbers and personal details. These days, multifunction printers (MFPs) are more like powerful computers. They re connected to your network and the cloud, accessed wirelessly by mobile devices, and capable of scanning, routing, storing and sharing documents. But there s another aspect that often flies under the radar: print security. But the flipside of all that power and flexibility is a big increase in security risks if the printer isn t securely configured. This quick-start guide will highlight some of the most important issues, and give you the inside track on how to ensure your print environment is smart and secure. Let s dive right in.

3 The Top 3 Threats Private Document 1 UNCOLLECTED DOCUMENTS It s estimated that 25% of print jobs are never picked up by the users who printed them. 1 That s a big waste both of resources (paper and toner) and effort (somebody has to remove the documents and get rid of them). But even more importantly, it s a significant security threat. That uncollected print job could be sensitive commercial information such as your marketing plan, latest sales figures or a presentation to a client. Or confidential information, such as somebody s performance review, bonus letter or personal details. 1. Nuance Based on Nuance Customer data / Internal Study of Help Desk Calls

4 The Top 3 Threats UNSECURED DATA Even if every print job is collected, you re still not out of the woods. If proper security isn t in place, documents with sensitive and confidential data moving around your network via a cable or wirelessly can still be intercepted. And don t forget that Multifunction printers (MFPs) nowadays also have hard drives to cope with complex print jobs. If data on the drive isn t deleted after printing, it could be open to abuse. 70% of organizations have had a data breach in their print environment, 2 and 60% of all breaches are carried out within a matter of minutes. 3 So tightening up print data security isn t an optional extra it s an absolute must. Private Document 2 70% Private Document 2 Downloading data... 2. 2010 Annual Study: US Cost of a Data Breach. The Ponemon Institute, LLC, March 2011 3. Verizon 2015 data breach investigations report

5 The Top 3 Threats MOBILE APPS, MOBILE USERS, MOBILE THREATS Mobile devices now outnumber people across the world, and are expected to grow exponentially 4 to 11.6 billion by 2021. Bring your own device (BYOD) is becoming the norm, as people connect smartphones, tablets and laptops to the company network. If organizations don t provide a simple, cross-platform printing solution for these users, they may decide that a third-party app is what they need. And that s a big threat, because unauthorized apps could seriously compromise network security. The U.S. Department of Health and Human Services fined two hospitals a total of $5.3 million for improper management of paper records. 5 4. Cisco Visual Networking Index 5. Paper Chase: The Huge Security Risks Now In Your File Room, Forbes, March 2012.

It s Time to Take Control The consequences of a printing security breach are too serious to ignore, and prevention is always better than cure. A structured, multi-pronged approach will ensure that your print environment is protected to the highest possible levels. You re going to need a mix of at least five capabilities.

7 It s Time to Take Control Secure printing means that confidential documents never lie unattended in paper trays. Print jobs are sent securely to the printer, and released only when the user enters a passcode or swipes an ID card. Image overwrite is used by advanced printers or MFPs to electronically shred documents that are held on the hard drive as part of print processing. This shredding can be carried out automatically, manually or on a schedule. Network security prevents unauthorized remote access to your printer and protects confidential data as it moves across the network. User authorization allows you to grant or deny access to specific MFP functions such as scanning or access to customer data. If you ve already got access controls in place for other tech, this is how you integrate your MFPs into those policies. Only 56 % of SMBs include multifunction printers (MFPs) in their security strategy. 6 Data encryption keeps prying eyes from seeing sensitive information as it moves to and from your printer. Print User clicks Print on any device Document is sent to printer and locked User swipes key card to print Printer deletes (overwrites) document data 6. 2016 Survey carried out by Coleman Parkes for Xerox

8 Don t be a Soft Target Organizations today realize the importance of having the latest version of software in the fight against security threats. But it s crucial not to overlook printer software when designing your print security strategy. Next-generation multifunction printers (MFPs) are equipped with embedded antivirus software, so you re safe against malware and other potential threats. They also have automatic firmware update functionality, so no user intervention is required. GET TO KNOW YOUR USERS It s easy to think that all security threats are malicious and come from outside the organization. But in fact 35% of data breaches are internal, and simply the result of human error. 7 User analytics will let you see who s accessing, sharing, scanning and printing documents. This user-centric view of your print environment will allow you to design policies and profiles to tighten your security and control your costs. 7. 2013 Cost of Data Breach Study: Global Analysis, Ponemon Institute

9 Take Your Print Security to the Next Level Print security is often neglected when organizations assess potential threats. But print data breaches have serious consequences for customer confidence, your competitive position even and your bottom line. Advanced print security solutions are available today to let you balance flexibility with security, control with ease of use. They allow you to fully exploit the latest trends and technologies such as mobile working and mobile printing without compromising confidentiality or exposing you to unnecessary threats. They harness the incredible power of MFPs, using next-generation technology to help you to stay smart and secure. To find out more about print security solutions, talk to a Managed Print Services (MPS) partner today.

About Xerox Xerox is an $11 billion technology leader that innovates the way the world communicates, connects and works. Our expertise is more important than ever as customers of all sizes look to improve productivity, maximize profitability and increase satisfaction. We do this for small and midsize businesses, large enterprises, governments, graphic communications providers, and for our partners who serve them. We understand what s at the heart of work and all of the forms it can take. We embrace the increasingly complex world of paper and digital. Office and mobile. Personal and social. Every day across the globe in more than 160 countries our technology, software and people successfully navigate those intersections. We automate, personalize, package, analyze and secure information to keep our customers moving at an accelerated pace. For more information visit www.. 2017 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation in the United States and/or other countries. BR22335