Categories: Articles

Et tu, printer?

used with permission from HP Technology at Work

When you think about protecting your business from security risks, what comes to mind? Most likely, you’re not thinking about your office printers. But you should.

Printers found in many businesses these days do more than just print. Many of them also scan, copy, fax and receive print jobs through a network connection. Like a computer, printers are equipped with processors, hard drives and operating systems—and are thus susceptible to the same threats that commonly plague PCs.

Watch out for these threats

There are many different ways your printer might be compromising the security of your business. Here are several threats you should make sure you’re defending against:

  • Document theft: This is the most obvious threat and applies to all printers. If printed documents are sent to the printer and left there for a period of time, it’s very easy for someone to come by and take them, or at least look through them. This is an easy way for sensitive information to fall into the wrong hands.Defense: Keep office printers in a visible open area instead of in a separate room where they can’t be monitored. HP Access Control Secure Pull Printing helps reduce unclaimed prints and increases efficiency. Users can print to a secure network, authenticate with ease, and retrieve jobs when necessary. Another good idea is to designate separate printers for departments that deal with sensitive information.
  • Unprotected settings and controls: If your printer control panel isn’t password protected, a user can wipe out all of your settings by resetting the printer defaults. People might also mistakenly or intentionally alter and reroute print jobs or open saved documents they should not be seeing.Defense: Make sure your control panel is password protected. You can most likely access the control panel or an administrative portal of some sort through a web browser, a screen on the printer, or your PC.
  • Data retrieval from stolen or tossed out printers: If your printer has an internal drive, it can store print jobs, scans, copies and faxes containing sensitive information. This information can fall into the wrong hands if someone steals the printer or when you get rid of your old one without properly erasing data.Defense: Make sure to erase the hard drive before you recycle or trade in any printer. When buying a new printer, look for one that has an encrypted hard drive, or buy a printer that doesn’t write to the hard drive in the first place.
  • Hackers: If you use a web-connected printer, there are several different threats posed by hackers that you should be aware of. Via the internet, attackers can send unwanted print jobs to your printer, use it to transmit faxes, change its LCD readout, change the settings, launch denial-of-service (DoS) attacks to lock it up, or retrieve documents. They can even install malware on the printer that will allow them to control it remotely.Defense: Use a printer that supports encrypted connections and connect online using an “https://” protocol, which is designed to transfer encrypted information, instead of the insecure “http://.” Don’t make your printer vulnerable by opening its Web interface to the internet, and check to see if your printer has Access Control List (ACL) support that lets you define who can use or administer it.

Businesses can no longer ignore their printers as security threats. Take the time to educate yourself on the types of printers your business is using, the significant threats outlined above and the proper precautions you can take to avoid them. Check out HP Secure Printing Solutionsfor more ways to help protect your company’s sensitive information.

eMazzanti Technologies

Recent Posts

How to Manage Remote Workers

With a global customer base, eMazzanti Technologies positions engineers and project managers in various locations…

4 years ago

Tips for Transitioning to Remote Work

Over a period of three weeks, most of the workforce in the United States found…

4 years ago

Collaborate with Exceptional Security and Privacy Using Microsoft 365 for Remote Work

Three years ago, Microsoft launched Teams, a powerful component of Office 365 (now Microsoft 365),…

4 years ago

You Look Marvelous! The Sprint to Video-based Team Interaction

In our new work-from-home (WFH) world, the requirement for on demand video conferencing has exploded…

4 years ago

5 Endpoint Security Best Practices When Remote Work Takes Center Stage

With the majority of employees working from home this spring, organizations have encountered new challenges.…

4 years ago

Cloud-based Security Solutions Deliver Powerful, Scalable Protection for SMBs

The average small to medium business (SMB) has most likely migrated at least some essential…

4 years ago