Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Latest News
    • PC Hardware

    20 Steps to Printer Security

    By
    eWEEK EDITORS
    -
    October 29, 2007
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      PrevNext

      120 Steps to Printer Security

      1

      Printers, particularly multi-function printers, are more and more a security concern, partly because of government regulations (for health information, for example) and partly because most companies simply want to keep data private. Printers can compromis

      220 Steps to Printer Security – 1. Overwrite the Hard Disk at End of Life

      2

      Printers with hard drives typically store data on the drive whenever they print, scan, fax or copy. In many cases they store additional data as well. When its time to say goodbye to the printer, youll ideally want an option to overwrite the entire drive

      320 Steps to Printer Security – 2. Overwrite Data Immediately

      3

      Sometimes its not enough to overwrite data at the printers end of life, since sensitive information can be stored on the drive at any time. To protect data from individual jobs, the printer should overwrite immediately after printing, scanning, copying,

      420 Steps to Printer Security – 3. Encrypt the Drive

      4

      Even if the printer overwrites data after every job, it may have additional information stored on it for easy reprinting, faxing or e-mailing. If you consider the stored information sensitive, youll ideally want to encrypt the drive with an administrator

      520 Steps to Printer Security – 4. Encrypt It — Really

      5

      All encryption schemes are not equal. If youre concerned enough to encrypt the drive, make sure the printer offers an appropriate level of encryption security. Some encryption schemes (like the ones on Microsoft Word documents) are easy to break with off

      620 Steps to Printer Security – 5. Print from Memory

      6

      Some printers let you bypass the hard disk and specify to print entirely from RAM (random access memory). This may slow some print jobs down significantly, but because these jobs never go to the hard disk, theres no data left on the hard disk to worry a

      720 Steps to Printer Security – 6. Secure Print, with Passwords

      7

      Probably the most common security feature for printers, secure printing lets you send a job to the printer then go to the printer and enter a password to print it. Unless you walk away at that point, this avoids the possibility of leaving sen

      820 Steps to Printer Security – 7. Securer Print, with Cards

      8

      Security experts generally agree that smart cards offer better security than passwords, which often get written down someplace where others can read them. You might want to consider printers that control their secure-print feature with a smar

      920 Steps to Printer Security – 8. Securer Print 2: Biometrics

      9

      Another alternative to passwords is biometric devices, which often mean a fingerprint reader. However, fingerprints can be faked, and many people are uncomfortable at having their fingerprints stored. At least one company — Konica Minolta —

      1020 Steps to Printer Security – 9. Securest Print

      10

      Requiring a password, card or biometric authentication are all good ideas, but you can get even better security with two, or even three levels of authentication: Something you know (the password), something you have (a card) and something you

      1120 Steps to Printer Security – 10. Secure Everything Else

      11

      For MFPs, consider the need for user authentication for other functions besides printing. Scanning, e-mailing, copying and faxing are all potential paths for sensitive information to go astray.

      1220 Steps to Printer Security – 11. Timeout the User

      12

      On those occasions when someone prints a secure job or copies a document and then walks away without remembering to log out, you dont want someone else reprinting the document. Look for a timeout feature, with a setting the administrator can

      1320 Steps to Printer Security – 12. Turn Off the Reprint Command

      13

      An even surer way to protect against someone reprinting files is to turn off the printers reprint command, if you can, or get a printer that doesnt include a reprint feature.

      1420 Steps to Printer Security – 13. Timeout on Secure Print Jobs

      14

      You can safely bet that someone will occasionally print with secure print, get sidetracked and forget to actually print. For those times, you may want a feature that will delete unprinted secure print jobs after a designated time period.

      1520 Steps to Printer Security – 14. Scan Encryption

      15

      MFPs may deliver scanned documents for internal use to an internal FTP site, directly to a designated PC or by sending them as e-mail attachments. To protect sensitive information in any of these cases, look for a feature that scans and sends

      1620 Steps to Printer Security – 15. Unauthorized Copy Control

      16

      Some printers will let you add a hidden security watermark on printed documents. The watermark doesnt show on the original, but will show up if the document is copied. This can help to discourage unauthorized copying, simply by making clear

      1720 Steps to Printer Security – 16. Secure Mailbox Print

      17

      Some MFPs let users store print jobs or scanned documents they need repeatedly in whats usually called a mailbox on the printers hard drive. Consider whether you want to require a password or other user authentication before storing a file in

      1820 Steps to Printer Security – 17. E-mail and Fax Destinations

      18

      For MFPs that can scan and e-mail, being able to both define a list of destination addresses for a user to choose from and prevent users from adding an address from the front panel ensures that information can go only to a controlled list of

      1920 Steps to Printer Security – 18. Who Sent the E-mail

      19

      When sending an e-mail from an MFPs front panel, some MFPs will automatically enter the e-mail address for the user whos logged in at the MFP and prevent the user from changing the address. This stops users from sending e-mail that seems to

      2020 Steps to Printer Security – 19. Tracking and Activity Logs

      20

      Account tracking features, complete with logs that show each job, automatically document who printed, scanned, faxed, copied or e-mailed what and when. Usually, this kind of information is used for internal billing or the like, but it can als

      2120 Steps to Printer Security – 20. Virus Protection

      21

      Some printers use a common OS (operating system) like some flavor of Windows, making them vulnerable to viruses. Others use embedded, proprietary operating systems that make them a lot safer. Find out what the OS is. If its something vulnerabl

      2220 Steps to Printer Security – See More Slideshows Like This One

      22

      • Channel Products of the Year
      • 20 Printer Features that Should Be Standard
      PrevNext

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×