Print in the Channel - issue #23

MPS SECURITY

19% of IT decision makers (ITDMs) still admitting they don’t know where data is stored across virtual locations, according to research by Canon Europe, it is no surprise that MPS remain a key target for cybercriminals,” he says. “A common pitfall is that many businesses still rely on outdated legacy systems, which pose serious threats to sensitive information.”

leading to data breaches. “There is also the growing number of threats as more devices become interconnected, and therefore the attack surface expands, providing more opportunities for cybercriminals. The increasing sophistication of cyberattacks also means that traditional security measures may no longer be sufficient.” Deyon adds that it should be remembered that cyberthreats include any malicious act that targets to harm, compromise, or exploit digital information, networks or systems. “There are several types of cyberthreats that can pose risk to individuals and businesses [and] that could potentially be launched on a printer network like malware, internal threats and Man-in-the-middle attacks. Man-in- the-middle attacks or data interception allows cyber criminals to intercept communications between devices to steal or manipulate data.” Keeping MPS secure But while the threats are numerous, so are the ways to keep MPS fleets secure, which resellers should be across. “Firstly, it is critical that IT leaders focus on mastering the basics and maintaining robust cyber hygiene across the workforce,” says Stuart. “For example, regularly updating software, isolating printers from open networks and using different authentication methods for different types of data will help protect sensitive information from criminals and prevent them from redirecting the print route to their own devices. “Partnering with a trusted MPS provider that offers end-to-end document management processes is crucial when it comes to security. Canon’s five-step approach to MPS reflects this, with each digital transformation journey tailored to the customer’s unique vulnerabilities and pain points. By first assessing the document workflow, Canon designs a bespoke roadmap to ensure a seamless transition to

Common threats Ian notes that one of the most

common threats to business is from cyber attackers looking to exfiltrate data or deny access to key systems. “Reasons for this may include seeking revenge or pursuing financial, political or competitive advantages,” he says. “Hackers will try any feasible entry route, including MPS setups. Systems may be scanned for unpatched software, known vulnerabilities, weak or default passwords. Many attacks are multi- staged; extracting data from one system – such as a valid username and password – may then allow escalated access to more valuable data and systems.” Graham adds that the most prevalent cyberthreats to MPS setups include unauthorised access, data interception, misconfiguration and malware attacks. “Networked printers can be exploited as entry points for cybercriminals to access sensitive information or launch broader network attacks,” he says. “Additionally, unencrypted data transmissions between devices and servers can be intercepted,

Hackers will try any feasible entry route, including MPS setups. Systems may be scanned for unpatched software, known vulnerabilities, weak or default passwords.

Ian Fox channel solutions and services specialist

www.xerox.co.uk/en-gb

CONTINUED

printinthechannel.co.uk

39

Powered by