Network and Print Security - Part One: Hardware
Fri Jan 13, 2017 | Lasers Resource
“Network printers can no longer be overlooked in the wake of weakening firewalls to the growing sophistication and volume of cyberattacks…” Ed Wingate, VP & GM, JetAdvantage Solutions at HP, Inc.
When talking about print security, there’s no better place to start than at the device. Is your printer or copier secure? What measures does it have in place to make sure your information is not being leaked or hacked? Sure, there are software and firewalls and tech support that help to protect it, but shouldn’t the device itself be picking up some of that slack? I wouldn’t want my money in a bank that has no vault door and only relies on patrolling guards.
There are devices with built-in security measures. Lasers Resource partners with HP and Xerox, and both companies are working to keep your information secure.
HP has increased the level of protection on their printers and copiers. Both their Enterprise and Pro level devices have security features that will constantly monitor, self-correct and alert if a risk is detected.
Enterprise Level Devices
HP Sure Start
Sure Start checks and validates the BIOS code. If the device detects any compromises to the integrity of the code, Sure Start defaults and boots with a safe “golden copy” of the BIOS.
Whitelisting only allows authentic code, digitally signed by HP, to be loaded into memory. The devices reboots if it detects any code not verified by HP.
HP JetAdvantage Security Manager
JetAdvantage Security Manager is a tool to check, repair, monitor, and control the security settings on your entire fleet from a single platform. To learn more about JetAdvantage Security Manager go to our page here.
Run-time Intrusion Detection
Run-time Intrusion detects anomalies during firmware and memory operations. If any threat or attack is detected, the device will reboot and go through all the other security features again.
Pro Level Devices
Secure Boot reads and verifies the boot code and ensures that only genuine HP code is running at startup. If different boot code is found, the device is placed in recovery mode.
Firmware Integrity Validation
This stage validates the firmware as authentic HP. If any other code is found in the firmware, the device reboots to recovery mode.
Run-time Code Integrity
Protects the memory from any intrusive, malicious code during operation.
HP JetAdvantage Security Manager
Xerox has partnered with McAfee to protect your data and your business. Whitelisting ensures that only approved files will run on your device. ConnectKey devices have McAfee embedded to enforce ePolicies set up by your organization and provides email alerts and audit logs. The software is constantly monitoring the information to and from just like it does on your computer.
Hard Disc Drive
Most printers and copiers have hard disc drives (HDD) that store print jobs and other sensitive information. This may not seem like a problem, but if an image of every document you’ve printed gets leaked, there could be a serious intellectual property breach.
The best way to protect the data on your copier’s HDD is to make sure you destroy the hard drive when you replace or remove the copier. There are services out there that will destroy the HDD and provide you with a certificate of destruction for your records.
Make sure that a printer or copier you buy is designed to protect your information. If you already have a device that is not set up for security, make sure you close any open ports. FTP and Telnet are a big risk and is the target for many hacks; protecting those kinds of ports will greatly reduce your risk of being a victim. In the next part of this series I will cover software that protects your data.
Subscribe to Our Blog
Enter your email address to subscribe to this blog and receive notifications of new posts by email.