{"id":713,"date":"2019-02-04T00:00:00","date_gmt":"2019-02-04T00:00:00","guid":{"rendered":"https:\/\/cos.p10.sol1.net\/uncategorized\/are-your-printers-vulnerable-to-a-data-hack\/"},"modified":"2023-11-01T04:59:10","modified_gmt":"2023-11-01T04:59:10","slug":"are-your-printers-vulnerable-to-a-data-hack","status":"publish","type":"post","link":"https:\/\/www.cos.net.au\/c\/cospedia\/are-your-printers-vulnerable-to-a-data-hack","title":{"rendered":"Are Your Printers Vulnerable to a Data Hack?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"713\" class=\"elementor elementor-713\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7780c7ba elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7780c7ba\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-73b4d9a2\" data-id=\"73b4d9a2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-13675aca elementor-widget elementor-widget-text-editor\" data-id=\"13675aca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">In the age of web-enabled and\u00a0<\/span><a href=\"https:\/\/www.cos.net.au\/technology\/multi-function-printers\"><span data-contrast=\"none\">multi-function\u00a0printers<\/span><\/a><span data-contrast=\"auto\">\u00a0printers, we are increasingly vulnerable to malicious data attacks. The reality is that if you have an unsecured printer, it is highly likely to put the entire network at risk.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">While you may have done\u00a0everything\u00a0you can to keep your digital devices and drives secure, quite often, most businesses do not consider the safety of their printers.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">The biggest risk an unsecured printer poses is the open door it leaves\u00a0for hackers to access printed documents (stored in the cache), or pending documents sent through a wireless connection to be printed.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">If these files are accessed and contain sensitive information, such as\u00a0company or customer financial information, credit card details, or internal memos\/documents, \u2014 the repercussions could be disastrous.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">In addition to theft of information, an unsecured printer is wide open to attacks that can cripple the ability to use your printer. Some hackers have been known to jam printers with false print jobs, just for fun, halting productivity by doing so.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p><h2><span data-contrast=\"auto\">HP Recently Conducted an IT Security Study and the Results were Sobering<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2><ul><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"5\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Almost half of Australia\u2019s SMEs with an annual turnover of $3 million or more did not think they were prepared for the Australian government\u2019s mandatory\u00a0<\/span><a href=\"https:\/\/www.oaic.gov.au\/privacy-law\/privacy-act\/notifiable-data-breaches-scheme\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">Notifiable Data Breaches Scheme<\/span><\/a><span data-contrast=\"auto\">\u00a0that came into effect in February 2018\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"5\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">57% of SMEs had not completed a data risk assessment in the last 12 months\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"5\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">Of the 43% of SMEs that had completed a risk assessment, only 29% included printers in their analysis.[\/vc_column_text][vc_custom_heading text=&#8221;The consequences of a data breach are enough to bring an SME to its knees.&#8221;][vc_column_text]HP\u2019s IT Security Survey found that:\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"5\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">67% of SMEs were mostly concerned with the disruption to business operations caused by a breach\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"5\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"5\" data-aria-level=\"1\"><span data-contrast=\"auto\">48% of SMEs were primarily concerned with the costs\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"5\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"6\" data-aria-level=\"1\"><span data-contrast=\"auto\">Others were worried more about the loss of intellectual property and legal issues they could face<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li><\/ul><h2><span data-contrast=\"auto\">Protect your data: invest in a secure printer that defends your network<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2><p><span data-contrast=\"auto\">Being aware of the security risk a printer poses isn&#8217;t\u00a0sufficient\u00a0for reducing the risk itself. If your business deals with and prints sensitive information, it&#8217;s wise to invest in a printer with security features.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">User identification such as PIN codes is one way of ensuring the correct user accesses the print job\u00a0and also\u00a0provides a record of printing. Other printers feature data encryption, which prevents data from being\u00a0seized\u00a0while moving to or from the printer.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">These\u00a0printers feature innovations that can stop a malicious attack before it\u00a0starts and\u00a0can even\u00a0\u2018self-heal\u2019 if the printer is compromised, by rebooting and\u00a0checking the integrity of the software.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Implementing the right data security\u00a0<\/span><a href=\"https:\/\/www.cos.net.au\/c\/technology\"><span data-contrast=\"none\">technology<\/span><\/a><span data-contrast=\"auto\">\u00a0is like having a 24\/7 security guard inside your printer.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">It&#8217;s far better to prevent a catastrophe\u00a0with secure printers\u00a0and this intelligent printing technology\u00a0is\u00a0a small investment, which can save you a fortune in stolen data.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p><p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<div class='watch-action'><div class='watch-position align-left'><div class='action-like'><a class='lbg-style3 like-713 jlk' href='javascript:void(0)' data-task='like' data-post_id='713' data-nonce='3c6d52cef8' rel='nofollow'><img class='wti-pixel' src='https:\/\/www.cos.net.au\/c\/wp-content\/plugins\/wti-like-post\/images\/pixel.gif' title='Did you find this useful?' \/><span class='lc-713 lc'>0<\/span><\/a><\/div><div class='action-unlike'><a class='unlbg-style3 unlike-713 jlk' href='javascript:void(0)' data-task='unlike' data-post_id='713' data-nonce='3c6d52cef8' rel='nofollow'><img class='wti-pixel' src='https:\/\/www.cos.net.au\/c\/wp-content\/plugins\/wti-like-post\/images\/pixel.gif' title='' \/><span class='unlc-713 unlc'>0<\/span><\/a><\/div> <\/div> <div class='status-713 status align-left'><\/div><\/div><div class='wti-clear'><\/div>","protected":false},"excerpt":{"rendered":"<p>In the age of web-enabled and\u00a0multi-function\u00a0printers\u00a0printers, we are increasingly vulnerable to malicious data attacks. The reality is that if you have an unsecured printer, it is highly likely to put the entire network at risk. While you may have done\u00a0everything\u00a0you can to keep your digital devices and drives secure, quite often, most businesses do not &#8230; <a title=\"Are Your Printers Vulnerable to a Data Hack?\" class=\"read-more\" href=\"https:\/\/www.cos.net.au\/c\/cospedia\/are-your-printers-vulnerable-to-a-data-hack\" aria-label=\"Read more about Are Your Printers Vulnerable to a Data Hack?\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":35891,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7,8],"tags":[261,262,213,17],"class_list":["post-713","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cospedia","category-productivity","tag-data-security","tag-data-security-threats","tag-future-of-technology","tag-technology"],"_links":{"self":[{"href":"https:\/\/www.cos.net.au\/c\/wp-json\/wp\/v2\/posts\/713","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cos.net.au\/c\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cos.net.au\/c\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cos.net.au\/c\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cos.net.au\/c\/wp-json\/wp\/v2\/comments?post=713"}],"version-history":[{"count":11,"href":"https:\/\/www.cos.net.au\/c\/wp-json\/wp\/v2\/posts\/713\/revisions"}],"predecessor-version":[{"id":35896,"href":"https:\/\/www.cos.net.au\/c\/wp-json\/wp\/v2\/posts\/713\/revisions\/35896"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cos.net.au\/c\/wp-json\/wp\/v2\/media\/35891"}],"wp:attachment":[{"href":"https:\/\/www.cos.net.au\/c\/wp-json\/wp\/v2\/media?parent=713"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cos.net.au\/c\/wp-json\/wp\/v2\/categories?post=713"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cos.net.au\/c\/wp-json\/wp\/v2\/tags?post=713"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}