This is the second in a series of posts from Lexmark security experts, designed to help you maximize print and network security. If you missed the previous entry, click here.
Print devices themselves can be a security risk for the enterprise. While IT teams are vigilant about updating computer hardware, many organizations are filled with aging, poorly secured print devices. The best defense against breaches is built into updated devices, with secure access features that restrict access to use and controls.
When evaluating print devices, look for these security features:
- Digitallysigned firmware and software updates — Encryption and digitally signed firmware of files ensures that only firmware created by the vendor can be installed on enterprise devices, keeping devices tamper-free.
- Accesscontrol to device functionality — Function access controls, authentication and authorization mechanisms, and backup passwords can keep unauthorized users from altering device settings.
- Securityconfiguration — Custom configurations ensure that devices match security policies and remediate automatically if a device is out of conformance.
- Physicallocks on hard drives and drawers — The ability to provide physical protection for access to hard drives or paper trays allows for an extra level of security for confidential data and print supplies.
- Outof service — When devices are removed from a secure location temporarily or permanently, an out of service wipe will remove all settings, data and information stored on the hard disk or memory of the device.
“Lexmark considers security a requirement in customer environments –no update or trade in required,” said Eric McCann, Lexmark manager and security expert. “We include these features standard on every product in our portfolio”.
With viruses like WannaCry becoming more commonplace, the need to look at all digital onramps into an enterprise need to be considered. Following these tips, and the others we share this week, can help provide insight into your enterprises’ specific security needs. Look for more tips here.
This series of posts from Lexmark security experts will be highlighting how to reduce these threats. Stay tuned to learn more about identifying potential vulnerabilities in your devices, network, and document solutions. Look for more tips here.
Learn more about Lexmark’s full spectrum of security solutions at lexmark.com/security.