Analysis

How to keep your printers secure

If you know that your business printers could be an entry point for hackers, what can you do to secure them?

In this video, HP's Security Specialist explains how the company has developed uniquely effective strategies for keeping its printers safe from cyber-attack. HP takes a different approach to securing its printers than other manufacturers. Instead of merely guarding the network on which the printers sit, HP printers have security built in from the base hardware upwards, starting with the printer's BIOS. This is protected with a technology called SureStart. The next level is the firmware, which is most likely to be susceptible to attack.

Many companies don't realise what powerful computing is contained within a printer, and how readily this could be used to compromise the network. IT administrators may be conscientious about keeping printer firmware up to date. But they may not be so careful about where that firmware has come from. It could be a compromised version itself, and without monitoring, this could sit on the network for months, risking data theft, before anyone realises.

This is where SureStart comes in. By running a low-level check prior to loading the firmware, SureStart checks that the BIOS hasn't been compromised, then the firmware is authenticated and this is augmented by run-time intrusion detection. This checks the printer's behaviour against what it normally does during day-to-day activities. If these checks fail, then the printer will automatically reboot into a safe mode, and then SureStart will fix the BIOS. Best of all, this is just the foundation of HP's printer security, with further layers of protection and monitoring above.

Find out more printer security.

Featured Resources

The complete guide to changing your phone system provider

Optimise your phone system for better business results

Download now

Simplify cluster security at scale

Centralised secrets management across hybrid, multi-cloud environments

Download now

The endpoint as a key element of your security infrastructure

Threats to endpoints in a world of remote working

Download now

2021 state of IT asset management report

The role of IT asset management for maximising technology investments

Download now

Recommended

Wisconsin Republican Party allegedly loses $2.3 million to hackers
hacking

Wisconsin Republican Party allegedly loses $2.3 million to hackers

30 Oct 2020
What is DevSecOps and why is it important?
Security

What is DevSecOps and why is it important?

30 Oct 2020
Weekly threat roundup: NHS COVID-19 app, Nvidia, and Oracle
Security

Weekly threat roundup: NHS COVID-19 app, Nvidia, and Oracle

30 Oct 2020
Ryuk behind a third of all ransomware attacks in 2020
Security

Ryuk behind a third of all ransomware attacks in 2020

29 Oct 2020

Most Popular

Do smart devices make us less intelligent?
artificial intelligence (AI)

Do smart devices make us less intelligent?

19 Oct 2020
Best MDM solutions 2020
mobile device management (MDM)

Best MDM solutions 2020

21 Oct 2020
What is Neuralink?
Technology

What is Neuralink?

24 Oct 2020