IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Print Devices: An overlooked network security risk

Printers are a target; give them the protection they need

whitepaper

Only 30% of IT professionals recognise printers as a high security risk, and yet 59% of organisations have reported a print-related data loss in the past year. The data shows that print devices are significantly overlooked in most IT security strategies, despite clear evidence they are an easy target for cyber criminals. 

Just like IoT sensors, today’s modern, intelligent, programmable print devices are routinely connected to the internet and the corporate network—in turn expanding the enterprise cyber attack surface. As an endpoint attached to the network, the print device is a significant security risk.

This whitepaper examines why print devices make easy targets for cyber criminals, and how organisations can better address print device security to manage and help reduce risk.

Recommended

Senate report slams agencies for poor cyber security
cyber security

Senate report slams agencies for poor cyber security

3 Aug 2021
Most employees put their workplace at risk by taking cyber security shortcuts
cyber security

Most employees put their workplace at risk by taking cyber security shortcuts

27 Jul 2021
61% of organizations say improving security a top priority for 2021
cyber security

61% of organizations say improving security a top priority for 2021

29 Jun 2021
ProtectedBy.AI’s CodeLock blocks malware at source code level
software as a service (SaaS)

ProtectedBy.AI’s CodeLock blocks malware at source code level

9 Jun 2021

Most Popular

Russian hackers declare war on 10 countries after failed Eurovision DDoS attack
hacking

Russian hackers declare war on 10 countries after failed Eurovision DDoS attack

16 May 2022
Windows Server admins say latest Patch Tuesday broke authentication policies
Server & storage

Windows Server admins say latest Patch Tuesday broke authentication policies

12 May 2022
Microsoft to double salary budget to retain workers
Careers & training

Microsoft to double salary budget to retain workers

17 May 2022
Researchers demonstrate how to install malware on iPhone after it's switched off
Security

Researchers demonstrate how to install malware on iPhone after it's switched off

18 May 2022