The focus for this week on National Cyber Security Awareness Month is about enabling secure access to the on-ramp and off-ramp of information from core business systems and imaging equipment.

Isn’t everyone securing access to technology?

authentication_bannerBased on the most recent cyber security research, Ponemon1 reports 34% of organizations have a process to restrict access to high-risk printers, including printed hardcopy documents. This research indicates the majority of businesses are vulnerable to a possible data breach because of poor printer related security practices and lax access controls for print devices.

When people think about restricting access with authentication methods, thoughts move quickly to scenes from movies like Mission Impossible or the first 20 seconds of Paramount’s Monsters vs Aliens trailer. Thankfully there are much easier and more acceptable methods to secure access to print, copy, fax, scan and workflow with network-connected printers.

Passwords, PIN codes, ID Badges, Fobs and Biometrics

Organizations can secure the print, copy, fax, scan and workflow functionality on print devices to match the security architecture already in place for building and PC access. Alternately, organizations can choose a different authentication method for computing technology compared to building access.

Here is a list of popular authentication methods used across all industries:

  • Username and Password – essentially a printer or copier MFP is a computer on the network; it has access to the same corporate directory systems for user account information. The same user name and password used to access a computer or email account can be used to secure access to printers/MFPs.
  • Personal Identification Number (PIN) code – this is a number usually between 4 to 6 digits and can be keyed in using the numeric pad on the device or a separate numeric keypad.
  • ID Badges and Key Fobs – there are many card based methods to read information on a card, such as a magnetic stripe, radio frequency or a chip on the card. Key fobs can also be used in the same way as radio frequency cards, but fit nicely in a pocket.
  • Biometric – fingerprint authentication has become more acceptable to consumers as smart phones have incorporated fingerprint scanners in recent years. Enterprise-grade fingerprint authentication is available for organizations looking to remove the need to manage PIN codes and ID badges.
  • Multi-Factor Authentication – organizations may decide to use more than one method to secure information. It is possible to secure access to printers and MFPs with 2 factors; using ‘something you have’ like an ID card and ‘something you know’ like a PIN code.

What solutions are available?

FollowMe by Ringdale simplifies user authentication by working with the organization’s existing authentication technologies to secure access to valuable information and enable Single Sign On capability (SSO). Supported authentication options include numeric keypads, RFID cards/fobs, contact smart cards, or biometric fingerprint readers. FollowMe also has a wide embedded portfolio, providing a fully integrated solution on most manufacturers’ multifunction printers (MFPs), where authentication is enabled directly from the device touch screen, without the need for external hardware.

FollowMe is recognized with ‘BLI Pick Award’ for document security, for further information on FollowMe by Ringdale visit www.followme.ringdale.com