Click here to learn how we’re responding to the COVID-19 outbreak and ensuring your safety

Part of Your Security Plan Must Include Printers

While organizations are spending 24% of their IT budget on security technology and resources, only about 2% of their budget is spent on securing their print infrastructure. User authentication is arguably the most simple and powerful end point security feature. But as shown in the chart below, most companies are not enforcing user authentication on their printers or multifunction printers (MFPs).

User authentication enforcement

This is problematic. These printing devices have become more like hubs and portals for processing, uploading, accessing, and disseminating vital corporate information on and outside of the corporate network.

They have many of the same risks as any other computing end point, including the possibility of being used as a network penetration point. It should not be acceptable that these devices are less secure than other network end points, like desktop computers or laptops.

Consider Third-party Services

A recent Keypoint Intelligence/InfoTrends survey revealed that 15% of organizations have had to deal with either an accidental or malicious data breach of hardcopy documents. With many of the most important (and sensitive) documents within organizations in hardcopy form at one time or another, this is not entirely surprising.

Nevertheless, these breaches can be prevented. Print devices often have extensive built-in security features; plenty of add-on functionality is available as well to digitize and secure your documents. Your organization may not have the time or expertise to fully leverage these security features and functionality, but there are experts that do.

These experts can give you the confidence you seek around print security. Organizations that have worked with a security services provider for their print infrastructure are three times more likely to be “extremely confident” they can comply with their industry’s regulations around document and data security.

As shown below, Keypoint Intelligence/InfoTrends found that these types of security services come very highly recommended across industries.

Recommend a printer vendor with security offerings

What’s Next?

When it comes to security, your organization is only as strong as its weakest link. Don’t ignore your print infrastructure when considering your organization’s IT security. Make sure you ask your print technology or IT service provider how they can help you ensure your print environment is secure.


Get a FREE Network Health Assessment

Ensure your network is secure and let our IT engineers recommend improvements.

Let's do it!