Technology

Print security means business security: protecting data across the physical-digital boundary

2025-11-28 15:21
770 views
Print security means business security: protecting data across the physical-digital boundary

How modern networked printers represent vulnerable endpoints that can expose an organization to significant risks.

  1. Pro
Print security means business security: protecting data across the physical-digital boundary Opinion By Quentyn Taylor published 28 November 2025

Overlooked print security risks enterprise data breaches and vulnerabilities

Comments (0) ()

When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.

Security padlock and circuit board to protect data (Image credit: Getty Images)

The digital perimeter of businesses is continuing to expand and constantly evolve in line with working patterns and behaviors.

Employees are now accessing business systems with increased flexibility, making visibility a key issue as data moves beyond traditional security perimeters and spreads across all kinds of personal devices.

  • Amazon Black Friday deals are live: here are our picks!
You may like
  • A digital padlock on a blue digital background. Third-party breaches are a wake-up call for modern cybersecurity
  • Security padlock and circuit board to protect data The resilient retailer’s guide to proactive cyber defense
  • A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault. A spy among us: rethinking cybersecurity in a hybrid world
Quentyn TaylorSocial Links Navigation

Senior Director of Information Security at Canon Europe, Middle East and Africa.

This shift means that security needs to be strengthened across every single point in a company’s infrastructure. Print, which may not seem like a threat, is often still overlooked in this picture, with 56% of businesses reporting at least one data loss through printers last year.

While cybersecurity is becoming increasingly sophisticated, one principle remains: it only takes one weak link for attackers to access an entire system.

To ensure that weakness is not print, businesses need to elevate their role, prioritize the right hardware and software that works together intuitively and not lose sight of how it fits into the bigger picture.

Only then can organizations provide enhanced visibility, control, and most importantly peace of mind to IT security teams when they need it most.

Are you a pro? Subscribe to our newsletterContact me with news and offers from other Future brandsReceive email from us on behalf of our trusted partners or sponsorsBy submitting your information you agree to the Terms & Conditions and Privacy Policy and are aged 16 or over.

An open door for hackers

Printers are a hub in the flow of information through a business, but they’re also endpoints - individual devices that can serve as entry points for malicious actors.

Not securing your print infrastructure is the business equivalent of leaving your back door wide open. It’s through these open doors that hackers can be seen to gain traction.

Today, an increasing number of printers are able to connect to the internet – whilst research has found that 28% of businesses continue to see securing printing in a remote environment as their biggest security challenge.

You may like
  • A digital padlock on a blue digital background. Third-party breaches are a wake-up call for modern cybersecurity
  • Security padlock and circuit board to protect data The resilient retailer’s guide to proactive cyber defense
  • A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault. A spy among us: rethinking cybersecurity in a hybrid world

With only 37% of ITDMs reporting having already implemented a zero-trust architecture there is clearly work to be done to give organization complete confidence in the security of their print infrastructure.

Printers are also unique in the sense that they sit between the physical and digital world. When information changes medium there is an elevated security risk as it crosses multiple potential points of interception.

That’s why they must be a fortress for data, acting as a strong line of defense to protect system access and ensure holistic information security.

Keep watch on your perimeter

Perimeter security remains one the biggest challenges that organizations face, yet the impact this has is vast. If you can’t effectively track the safety of data across systems, it’s difficult to apply the right security measures or optimize resources. Without clear visibility into where data lives and who can access it, security strategies are incomplete.

With more endpoints to monitor and data moving more easily between networks and devices, vulnerabilities are becoming harder to identify. The goal posts for security teams are constantly shifting, as upcoming regulations such as the EU’s Cyber Resilience Act, increase the reporting requirements for businesses.

As a result, an increasing amount of time is being dedicated to meeting the visibility challenge.

AI is supercharging what’s possible in this regard. Instead of IT teams needing to have eyes everywhere, AI and machine learning can be used to constantly assess the network your printer sits in and configure optimal settings across your print infrastructure.

Not only does this free up IT team capacity by streamlining system monitoring to rapidly spot and remedy vulnerabilities, but it also future-proofs systems to enable continued system expansion.

With so many emerging and evolving threats to keep on top of – security teams want print working for them, not against them. AI presents an opportunity to alleviate pressure and ensure proactive and robust perimeter security.

Adopt a multi-layered defense

A resilient security strategy must be layered. Only when we consider the whole picture, and how hardware and software work seamlessly together across the entire business system, can a multi-layered defense be achieved.

For example, in print while integrating badge-based printer access is an essential ingredient for ensuring all data entering print systems is only seen by the right people, it only goes so far.

Cross referencing data with system login activity is essential to successfully identifying potential risks. This confirms that the employee is at that location at the time they supposedly accessed the printer.

This location data makes multi-factor authentication (MFA) more intelligent, providing an additional layer of protection against compromised credentials.

This approach transforms printer key authentication from a tool which is convenient to print users, into a wider security measure which enhances the broader perimeter security of the business.

A strong print security posture, when integrated into systems to harness wider business data in an intelligent way, can bolster an organization's overall security and ensure only the right people can access or distribute sensitive information.

Fortify your security, with print

Print is a critical part of the cybersecurity picture – one that sits right on the boundary between the digital and physical worlds. With endpoints multiplying and threats evolving, businesses can’t afford blind spots.

Ignoring print security leaves the entire business exposed to cybercriminals searching for a weak link. By treating print as a core part of your perimeter strategy, you will close off a tried and tested route by attackers. Print security means business security.

We've featured the best business VPN.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

TOPICS AI Quentyn TaylorSocial Links Navigation

Quentyn Taylor is the Senior Director of Information Security and Global Response at Canon for Europe, Middle East and Africa.

You must confirm your public display name before commenting

Please logout and then login again, you will then be prompted to enter your display name.

Logout Read more A digital padlock on a blue digital background. Third-party breaches are a wake-up call for modern cybersecurity    Security padlock and circuit board to protect data The resilient retailer’s guide to proactive cyber defense    A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault. A spy among us: rethinking cybersecurity in a hybrid world    Representational image depecting cybersecurity protection Protecting productivity: the imperative of cybersecurity in manufacturing    IA y ciberseguridad The new age of layered security: from supply chains to endpoints    World Password Day 2025 I am a cybersecurity expert - here's why it's time for businesses to bolster defenses, beyond just tech    Latest in Pro Users display warnings about the use of artificial intelligence (AI), access to malicious software or threats to online hackers. computer cyber security Warning concept or tech scam. Take extra care shopping for Black Friday deals - experts find thousands of fake websites looking to steal your details    Microsoft Teams Microsoft Teams guest access could let hackers bypass some critical security protections    Abstract image of cyber security in action. Supply chain cyberattacks are becoming unmanageable - and UK businesses are paying the price    Representational image of a cybercriminal Multiple London councils affected by apparent cyberattack    IA y ciberseguridad Zendesk users targeted by Scattered Lapsus$ Hunters hackers and fake support sites    The Ionos logo on a blue background next to a TechRadar symbol that reads 'Black Friday deals Get business-grade cloud storage for just $1 per month this Black Friday    Latest in Opinion Security padlock and circuit board to protect data Print security means business security: protecting data across the physical-digital boundary    Amazon and OpenAI Amazon blocks ChatGPT shopping agent – what the fallout could mean for you    Malware attack virus alert , malicious software infection , cyber security awareness training to protect business The war on trust: how AI is rewriting the rules of cyber resilience    Sam Altman Sam Altman wants his AI device to feel like 'sitting in the most beautiful cabin by a lake,' but it sounds more like endless surveillance    EVA AI Dating Cafe Please don't date your AI because it will never love you or pick up the check    Sam Altman talking ChatGPT’s new voice integration feels like the missing piece in AI chat    LATEST ARTICLES