Click me
Transcript

Securing Printers Guidelines

Securing Printers Guidelines 4 Keys to Securing Your Printer Your printers can be a gateway to your network, your data, your users and all networked devices. By implementing a few practices, you may be able to avoid spending the time and resources needed for innovation and digital transformation on rebuilding after a breach or attack. Safeguard four printer elements to focus on transformation instead of recovery: Network Create a firewall rule or configure network traffic at the router. Disable unused communication ports. Enable Wi-Fi Protected Access (WPA) Security, and then secure Bluetooth, Near Field Communication (NFC) and Wi-Fi Direct. Deploy IEEE 802.1X port security if you handle sensitive data. 75% of data breaches are caused by external attackers." Cybercrime damage costs to hit $6 trillion annually by 2021.2 Data • Encrypt all data at rest using HDD or third-party software. • Encrypt data in transit with network-level encryption, such as Internet Printing Protocol (IPP) 43% of companies have an encryption strategy deployed across their enterprise. Device • Place printers in secure areas with group policies. 97% • Make sure employees do not leave printouts unattended. of organizations felt that unsecured loT devices - • Secure HDD/RAM with removable HDDS and enable including printers - could be catastrophic to the organizations. Only 29% actively monitor for risks.* secure file erase. • Disable unused physical ports. • Apply security patches regularly, including firmware and non-native software. User Identity Using stolen credentials was the top cause of data breaches.5 Actively authentic users. • Change default printer passwords. Require employees to create strong and unique passwords. Use two-factor authentication. A Google study revealed that 12 million credentials were stolen from phishing and 3.3 billion credentials stolen during third-party breaches. EPSON Sources: 1 verizonenterprise.com/verizon-insights-lab/dbir/ 2 scmagazine.com/innovation-versus-cybersecurity-survival-hangs-in-the-balance/article/665348/ 3 thalesesecurity.com/2018/global-encryption-trends-study 4 zdnet.com/article/most-it-professionals-fear-iot-cyber-attacks-new-research-suggests-few-are-doing-anything-about/ 5 verizonenterprise.com/verizon-insights-lab/dbir/ 6 static.googleusercontent.com/media/research.google.com/en//pubs/archive/46437.pdf EXCEED YOUR VISION

Securing Printers Guidelines

shared by niegeborges on Apr 04
13 views
0 shares
0 comments
Infographic designed for Epson about how to secure printers.

Category

Technology
Did you work on this visual? Claim credit!

Get a Quote

Embed Code

For hosted site:

Click the code to copy

For wordpress.com:

Click the code to copy
Customize size