Print Security - Tektonika€¦ · Print Security: Protecting a Central Endpoint An IDC InfoBrief...
Transcript of Print Security - Tektonika€¦ · Print Security: Protecting a Central Endpoint An IDC InfoBrief...
An IDC InfoBrief sponsored by HP CanadaPrint Security: Protecting a Central Endpoint
pg 2
For this report, IDC conducted a survey of 150 IT security specialists at large organizations in Canada to explore print security trends.
A key focus of the research was to evaluate enterprise IT endpoint security strategies, including printers and printed documents. Respondents to the August 2016 survey were decision makers for device security (or were very knowledgeable about this) and represented a variety of industries.
Study Goals
An IDC InfoBrief sponsored by HP CanadaPrint Security: Protecting a Central Endpoint
pg 3
Security breaches can impact us all: Yahoo incurred the largest data breach in history, with the cyber attack compromising over 1 billion user accounts. Just over half of organizations are encrypting data in transit and at rest, leaving data in almost 50% of organizations at risk.
The Need for Print Security: Breaches Happen
A THIRD OF ORGANIZATIONS CONSIDER MORE THAN HALF OF THEIR DOCUMENTS PRIVATE OR SENSITIVE.
of Canadian organizations surveyed recently had an
IT security breach
of these were print-related
40%
56% Print security breaches were highest in the
healthcare, real-estate, and legal industries.
An IDC InfoBrief sponsored by HP CanadaPrint Security: Protecting a Central Endpoint
pg 4
Securing Printers: Print Takes a Backseat to Other Endpoint DevicesMost organizations claim their IT security strategy includes printers but worry more about other endpoint devices.
are concerned about securing network printers
are concerned about securing personal printers
are concerned about securing laptops
are concerned about securing smartphones
ONLY45%
ONLY43%
65%
61%
IT security specialists are far less confident in
measures taken to secure network printers than
other endpoint devices.
An IDC InfoBrief sponsored by HP CanadaPrint Security: Protecting a Central Endpoint
pg 5
The biggest print security challenge Canadian organizations say they face in the next 12 months:
Top 5 Challenges to Securing Printers
4 Reducing/protecting against external threats
4 Ensuring only authorized individuals have access to documents (adding/improving internal IT controls)
4 Physical security
4 Device maintenance/upgrades
4 Budgets and costs
An IDC InfoBrief sponsored by HP CanadaPrint Security: Protecting a Central Endpoint
pg 6
Print Security Defences
don’t whitelist firmware code
62%
don’t check BIOS integrity
53%
don’t protect information sent to
or stored on printers
46%
don’t review printer event security logs
48%
don’t include physical security (locks)
41%don’t monitor printer activity
45%
Commonly Overlooked Features and Practices Among Canadian Organizations
An IDC InfoBrief sponsored by HP CanadaPrint Security: Protecting a Central Endpoint
pg 7
Tackling Print Security ChallengesMost Canadian organizations have deployed administrative access control and firewalls to secure their printers:
Most organizations know they need help — and want it:
impose user authentication and tracking of printed jobs from PCs67%mainly rely on printer
security features68%
require pull printing for any print job51%
are strongly influenced by print security features for purchase/lease decisions63%
of organizations use external consultants specifically for print security49%are interested in additional
print-related security services58%
An IDC InfoBrief sponsored by HP CanadaPrint Security: Protecting a Central Endpoint
pg 8
Organizations need to be aware of cybersecurity legislation and the ramifications of not being in compliance. A set of ground rules are contained in the Personal Information Protection and Electronic Documents Act (PIPEDA), including provisions concerning data protection and cybersecurity.
Print security is underscored in one of the most important provisions that safeguards personal information “against loss or theft, as well as unauthorized access, disclosure, copying, use, or modification.” The loss of valuable information from a security breach can result in potential lawsuits, share value declines, and lost revenue, and can impact customer or investor confidence.
A comprehensive security strategy that includes print and provides detailed auditing of every element in the organization’s infrastructure is essential.
Protecting Personal Identifiable Information The protection of personal identifiable information (PII) is one of the key considerations for an organization
An IDC InfoBrief sponsored by HP CanadaPrint Security: Protecting a Central Endpoint
pg 9
4 Secure beyond the firewall
4 Secure every single IT endpoint device on the network
4 Adopt security policies and tools to recover from breaches
4 Encrypt data in transit and at rest
4 Apply digital certificates
Print Security Steps to Take NowWhat organizations should be doing to mitigate the risk of sensitive data being exposed:
To learn more about print security and for specific HP solutions:
http://www8.hp.com/us/en/solutions/business-solutions/printingsolutions/securityoverview.html