The leakage or theft of sensitive and confidential corporate information. Large enterprises may have developed and implemented data retention and destruction policies but rarely do these include, or even mention, printers. Companies look at hardcopies of documents, CD's, DVD's and workstation, laptop and server hard drives when developing their data destruction policies.123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com
While it is clear they identify hard drives as a source of sensitive information, rarely do they consider the hard drives contained within their printers, if they even know of their existence. Printers are also commonly overlooked when security policies, procedures and guidelines are developed and implemented. Little time, if any, is spent looking at printer security or the implications of not securing the corporate printers. All the more disturbing this becomes when you contemplate the common types of documents that pass through printers in a corporate environment. Depending on the industry or the department within the organization, documents can vary from sensitive financial records, personal customer data or detailed network diagrams, to name a few.
123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com
To understand how sensitive data is leaked via a simple printer to the outside world, it requires an understanding of the corporate environment, security controls within that environment, and the general flow of information between users, printers and file systems that house restricted data.123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com
In the ideal, secure corporate environment, a user has restricted access to files that pertain to his or her job function. The files reside on a secure server within the corporate network and are protected by strong access control policies requiring a user to authenticate before being allowed access to files. In our example, a user requires a sensitive financial document for a meeting he is about to attend.
123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com123.hp.com
No comments:
Post a Comment