- Pro
Overlooked print security risks enterprise data breaches and vulnerabilities
Comments (0) ()When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.
(Image credit: Getty Images)
The digital perimeter of businesses is continuing to expand and constantly evolve in line with working patterns and behaviors.
Employees are now accessing business systems with increased flexibility, making visibility a key issue as data moves beyond traditional security perimeters and spreads across all kinds of personal devices.
- Amazon Black Friday deals are live: here are our picks!
-
Third-party breaches are a wake-up call for modern cybersecurity
-
The resilient retailer’s guide to proactive cyber defense
-
A spy among us: rethinking cybersecurity in a hybrid world
Senior Director of Information Security at Canon Europe, Middle East and Africa.
This shift means that security needs to be strengthened across every single point in a company’s infrastructure. Print, which may not seem like a threat, is often still overlooked in this picture, with 56% of businesses reporting at least one data loss through printers last year.
While cybersecurity is becoming increasingly sophisticated, one principle remains: it only takes one weak link for attackers to access an entire system.
To ensure that weakness is not print, businesses need to elevate their role, prioritize the right hardware and software that works together intuitively and not lose sight of how it fits into the bigger picture.
Only then can organizations provide enhanced visibility, control, and most importantly peace of mind to IT security teams when they need it most.
Are you a pro? Subscribe to our newsletterContact me with news and offers from other Future brandsReceive email from us on behalf of our trusted partners or sponsorsBy submitting your information you agree to the Terms & Conditions and Privacy Policy and are aged 16 or over.An open door for hackers
Printers are a hub in the flow of information through a business, but they’re also endpoints - individual devices that can serve as entry points for malicious actors.
Not securing your print infrastructure is the business equivalent of leaving your back door wide open. It’s through these open doors that hackers can be seen to gain traction.
Today, an increasing number of printers are able to connect to the internet – whilst research has found that 28% of businesses continue to see securing printing in a remote environment as their biggest security challenge.
You may like-
Third-party breaches are a wake-up call for modern cybersecurity
-
The resilient retailer’s guide to proactive cyber defense
-
A spy among us: rethinking cybersecurity in a hybrid world
With only 37% of ITDMs reporting having already implemented a zero-trust architecture there is clearly work to be done to give organization complete confidence in the security of their print infrastructure.
Printers are also unique in the sense that they sit between the physical and digital world. When information changes medium there is an elevated security risk as it crosses multiple potential points of interception.
That’s why they must be a fortress for data, acting as a strong line of defense to protect system access and ensure holistic information security.
Keep watch on your perimeter
Perimeter security remains one the biggest challenges that organizations face, yet the impact this has is vast. If you can’t effectively track the safety of data across systems, it’s difficult to apply the right security measures or optimize resources. Without clear visibility into where data lives and who can access it, security strategies are incomplete.
With more endpoints to monitor and data moving more easily between networks and devices, vulnerabilities are becoming harder to identify. The goal posts for security teams are constantly shifting, as upcoming regulations such as the EU’s Cyber Resilience Act, increase the reporting requirements for businesses.
As a result, an increasing amount of time is being dedicated to meeting the visibility challenge.
AI is supercharging what’s possible in this regard. Instead of IT teams needing to have eyes everywhere, AI and machine learning can be used to constantly assess the network your printer sits in and configure optimal settings across your print infrastructure.
Not only does this free up IT team capacity by streamlining system monitoring to rapidly spot and remedy vulnerabilities, but it also future-proofs systems to enable continued system expansion.
With so many emerging and evolving threats to keep on top of – security teams want print working for them, not against them. AI presents an opportunity to alleviate pressure and ensure proactive and robust perimeter security.
Adopt a multi-layered defense
A resilient security strategy must be layered. Only when we consider the whole picture, and how hardware and software work seamlessly together across the entire business system, can a multi-layered defense be achieved.
For example, in print while integrating badge-based printer access is an essential ingredient for ensuring all data entering print systems is only seen by the right people, it only goes so far.
Cross referencing data with system login activity is essential to successfully identifying potential risks. This confirms that the employee is at that location at the time they supposedly accessed the printer.
This location data makes multi-factor authentication (MFA) more intelligent, providing an additional layer of protection against compromised credentials.
This approach transforms printer key authentication from a tool which is convenient to print users, into a wider security measure which enhances the broader perimeter security of the business.
A strong print security posture, when integrated into systems to harness wider business data in an intelligent way, can bolster an organization's overall security and ensure only the right people can access or distribute sensitive information.
Fortify your security, with print
Print is a critical part of the cybersecurity picture – one that sits right on the boundary between the digital and physical worlds. With endpoints multiplying and threats evolving, businesses can’t afford blind spots.
Ignoring print security leaves the entire business exposed to cybercriminals searching for a weak link. By treating print as a core part of your perimeter strategy, you will close off a tried and tested route by attackers. Print security means business security.
We've featured the best business VPN.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
TOPICS AI Quentyn TaylorSocial Links NavigationQuentyn Taylor is the Senior Director of Information Security and Global Response at Canon for Europe, Middle East and Africa.
You must confirm your public display name before commenting
Please logout and then login again, you will then be prompted to enter your display name.
Logout Read more
Third-party breaches are a wake-up call for modern cybersecurity
The resilient retailer’s guide to proactive cyber defense
A spy among us: rethinking cybersecurity in a hybrid world
Protecting productivity: the imperative of cybersecurity in manufacturing
The new age of layered security: from supply chains to endpoints
I am a cybersecurity expert - here's why it's time for businesses to bolster defenses, beyond just tech
Latest in Pro
Take extra care shopping for Black Friday deals - experts find thousands of fake websites looking to steal your details
Microsoft Teams guest access could let hackers bypass some critical security protections
Supply chain cyberattacks are becoming unmanageable - and UK businesses are paying the price
Multiple London councils affected by apparent cyberattack
Zendesk users targeted by Scattered Lapsus$ Hunters hackers and fake support sites
Get business-grade cloud storage for just $1 per month this Black Friday
Latest in Opinion
Print security means business security: protecting data across the physical-digital boundary
Amazon blocks ChatGPT shopping agent – what the fallout could mean for you
The war on trust: how AI is rewriting the rules of cyber resilience
Sam Altman wants his AI device to feel like 'sitting in the most beautiful cabin by a lake,' but it sounds more like endless surveillance
Please don't date your AI because it will never love you or pick up the check
ChatGPT’s new voice integration feels like the missing piece in AI chat
LATEST ARTICLES- 1Save 50% on Hotspot Shield with this Black Friday VPN deal
- 2Take extra care shopping for Black Friday deals - experts find thousands of fake websites looking to steal your details
- 3NYT Connections hints and answers for Saturday, November 29 (game #902)
- 4Quordle hints and answers for Saturday, November 29 (game #1405)
- 5NYT Strands hints and answers for Saturday, November 29 (game #636)