5 Reasons Hackers Love Office Printers

Nobody ever suspects the office printer. Fifty-six percent of enterprise companies leave printers out of their security strategy.[1] Why? It’s like hanging a sign on the printer that reads, “Attack me!” Some networked office printers are teeming with so many vulnerabilities that even the laziest of hackers or thieves could take a successful swipe.

Hackers Loves Office Printers

Research conducted by the Ponemon Institute reported that 60 percent of companies surveyed had a data breach involving printers[2], requiring an average of 46 days to resolve a cyberattack[3]. Here are five ways print security risks could wreak havoc on a business:

  1. Network vulnerability

Even behind the firewall, many devices on a network may create a new access point to the entire network. When printers are overlooked in a comprehensive network security plan, that point of entry can be very welcoming to hackers, who can cause catastrophic consequences once inside the network.

  1. Attacks

When hackers gain access to unsecured printers, they wield all the power for destruction. Your printer could become a possessed machine, printing random jobs, transmitting foreign faxes and changing all of its settings. Printers are also prime targets of denial-of-service (DoS) attacks.

  1. Data breaches

Unencrypted print data is a hacker’s dream. If data transmitted to a printer is unencrypted, it shows up as clear, legible text. If hackers want access to this data, it can be captured and read using a standard PRN reader.

  1. Printer pillagers

Abandoned printouts can sit for days in the printer’s document tray or end up littering the copy room. Nosy employees can sneak off with confidential information inadvertently left behind. This information leak also makes a company liable for regulatory compliance failures.

  1. Mobile devices compound the issue
    As computing devices on the network expand to include mobile devices, it is more challenging to provide network authentication and secure access to printers. A mobile solution that addresses user authorization and secure data transmission to printers is necessary to be protected. The more devices we introduce to a connected network, the more vulnerabilities and instances for hacking we create.

Avoid all of the above office nightmares when you take precautions to address printer security. Start by ensuring you have the following steps covered:[4]

  • Make sure that computing devices use only encrypted communication protocols, and disable unused ports and protocols on the printer.
  • Put a system in place that erases or destroys the printer’s hard-drive data as part of removing the device from circulation.
  • Support at least one form of user authentication (preferably two or three), and consider the implementation of pull printing for print environments with a high volume of confidential information or compliance requirements.
  • Ensure printer firmware is current and only legitimate firmware is ever loaded.
  • Use a fleet management tool to centrally manage, monitor and remediate devices to ensure compliance with security policies.
  • Make sure all data between both desktop and mobile devices is encrypted to be certain the print-related data is fully protected from man-in-the-middle attacks.

The Wolf HP

Virtual Faxing

Virtual Faxing

Faxing might sound like outdated technology to the younger members of the workforce. However there are still many organisation that rely on faxing for document sharing (especially in legal, healthcare, and government industries) So how can you maintain faxing functionality while freeing yourself from the physical resource burdens that traditional faxing entails?
The Ultimate Guide

Ultimate Guide - Assessing Your Printer

Did you know that printing is typically the third highest business operating expense, behind rent and payroll? We highly recommend that you don’t make any purchasing decisions about printers or MFPs until you’ve read our ultimate guide from cover to cover!
Green Office Guide

The Green Office Guide

Climate change is a defining issue of our generation, and one that affects every single person on the planet. We all have to do our part to try to make a positive environmental impact – and this includes making our businesses more sustainable.
HP Business Printers job concurrency

HP Business Printers

HP Business Printers - the release of HP Page-Wide Business Printers bringing functions like design, low total cost of ownership & security strategies.
Docuware Human Resource Onboarding

Human Resource Onboarding

A solution to modernising Human Resources is DocuWare which is a complete digital platform for storing, retrieving and editing HR records. Set a new course with fully modern HR management processes: digital files aren’t only helpful for managers and their HR team, every employee in the company will benefit from built-in services and faster processes.
accounts payable

Speed Up Your Accounts Payable

Whilst everyone has their own methods of processing invoices there are some key concepts to speed up the process. Ask yourself these questions and see if your organisation is ready for an Accounts Payable Solution:
Hackers Loves Office Printers

5 Reasons Hackers Love Office Printers

Nobody ever suspects the office printer. Fifty-six percent of enterprise companies leave printers out of their security strategy. Why?
NBN Is Here

The NBN Is Here

Brace yourselves, the NBN is here! It’s new, it’s exciting, it’s kind of annoying and you could get screwed in the process.
Cash and Carry Retailer

Why I Laugh When You Go To A Cash And Carry Retailer

When I get told from a business that they are going to get their printer or multi-function from a Cash and Carry Retailer I secretly laugh. Don’t get me wrong...

Read more about HP’s print options here: www.hp.com/go/PrintersThatProtect

[1] “The Business Value of Printer Security,” IDC, November 2015.

[2] “Insecurity of Network-Connected Printers,” Ponemon, October 2015.

[3] “2015 Global Cost of Cyber Crime Study,” October 2015.

[4] “The Business Value of Printer Security,” IDC, November 2015.

Source: http://www.freedomatwork.asia/5-reasons-hackers-love-office-printers/