Coordinated Headquarters Showroom

Coordinated Blog

End-to-End: Your Network Is Locked Up Tight, What About Your Printers and Other Endpoints?

Posted by Kirk Studebaker // VP of Sales | Sep 21, 2018 3:22:44 PM

Information security is an issue that’s not ever going away.

Methods of protection and attack will change over the years, but there will be cybercriminals attempting to steal data when we all finally get our flying cars in the future.

Most companies and leaders have at least heard about the importance of securing their networks and information. Hopefully you’re acting on this knowledge.

However, even companies that invest in robust network protection can overlook other points of entry cybercriminals look for.

In addition to you network, you need to be thinking about your network endpoints -- specifically your copiers and printers.

Here’s a quick checklist for device security. Use these items to discuss your level of device security with your internal IT team and/or your managed print services partner.

  • Do you have network vulnerabilities that might then expose connected devices to attack?
  • How do you ensure all devices are compliant with network assets policy?
  • Is there an enforcement process?
  • Do you have a policy to clear firmware prior to deployment? Is there a repeatable process that is followed for this?
  • If a device falls out of compliance, what happens? Is there a remediation process to bring the device back into compliance with the security policy?
  • If out of compliance, is there an alert system and audit trail for the device?
  • Are fax connections protected? Is there complete separation between fax network connections and phone lines? Fax connections can be a backdoor into your network.
  • Is a firewall in place to prevent unauthorized external access via your devices into your systems through a network connection?
  • Can a device overwrite the files stored on its hard drive? Can it do so automatically on a schedule?
  • Do you or your MPS partner have a policy that is documented and followed to digitally shred or physically destroy hard drives when taking a printer or copier out of service?
  • Is data encrypted as it moves in and out of the device?
  • Is data stored in the device encrypted?

If you can’t place a checkmark next to each of these items, you could be at risk of a data breach.

As you include your network-connected printers and copiers in your security policy, be sure that you’re working with someone who understands these risks and how to shut the door on cybercriminals.

 

Click me

Topics: Security, Printers and Copiers, IT & Network Services Management

Written by Kirk Studebaker // VP of Sales

Kirk has been in the Office Technology sector for 20 years working in the dealer world focused on supporting sales teams. Having worked for Manufacturers and dealers as well as his own entrepreneurial ventures, Kirk is dedicated to the development of people in the sales profession.

Outside of work Kirk has a wife and two children and enjoys being outside whether hunting or horseback riding.