Cybercrime, Internal breaches, Compliance infringement. These are all risks and costs of an unprotected network. Cybercrime costs businesses $7.7 million a year, so it’s no wonder that most businesses go to great lengths to guard their PCs—but what about printers?
Let’s look at the numbers: 60 % of companies had a data breach involving printers; 73 % of CISOs expect a major security breach within a year; and 64 % of IT managers state their printers are likely infected with malware.
Protecting your PCs but not your printers is like padlocking your front door and leaving the back door open. They’re both gateways into your network, and hackers and malware will try both doors to make their way in.
Critical gaps can occur at multiple points within your imaging and printing environment. Once you understand these weak spots it’s easier to reduce the risks. Here are your vulnerability points—and what you can do to help protect them.
Where are your printers most vulnerable?
|Storage media||Imaging and printing devices store sensitive information on internal drives or hard disks, which can be accessed if not protected.|
|BIOS and firmware||Firmware that becomes compromised during startup or while running could open a device and the network to attack.|
|Mobile printing||Employees who print on the go may accidentally expose data, or leave printouts unsecured.|
|Management||Without adequate monitoring, security blind spots across your fleet may remain undetected and increase costly data risks.|
|Network||Printing and imaging jobs can be intercepted as they travel over the network to or from a device.|
|Input tray||Special media for printing checks, prescriptions, and other sensitive documents can be tampered with or stolen from an unsecured tray.|
|Ports and protocols||Unauthorised users can access the device via unsecured USB or network ports or via unsecured protocols (such as FTP or Telnet).|
|Control panel||Users can exploit imaging and printing device settings and functions from an unsecured control panel, and even disable the device.|
|Cloud-based access||Unsecured cloud connectivity may expose data to unauthorised users.|
|Capture||Multi-function printers can easily capture and route jobs to many destinations, potentially exposing sensitive data.|
What are the security practices implemented to ensure records and data are protected?Key areas of discussion at the Roundtable;
- Enhance security, control & productivity
- Protect documents and encrypt print jobs on their way to a device.
- Enhance the security of networked printers by easily authenticating devices and users.
- Offer print-reliant departments, and mobile or remote workers access to the features they need.
- Delete unclaimed and obsolete jobs prior to printing—saving money and conserving resources.
- How to authenticate, safeguard, secure your data?
- Enhance the security of networked printers and multifunction printers (MFPs) by easily authenticating devices and users.
- Provide users with a single authentication solution that supports a wide variety of proximity card protocols.
- Offer mobile or remote clinical care workers with the ability to access print wherever they need to within the healthcare ecosystem.
- Reduce IT support costs while enabling 7x24 hour availability.
- Support organizational security and privacy policies.
- Benefits of secured prescription printing, wristband printing solutions.
A must attend roundtable for CMO, CIOs and other key technology/business decision makers from large hospitals.
|1920||Roundtable Discussion: Health of Healthcare IT is at Risk|
|Moderated by: Girish Kulkarni, Chairperson, CHiME|
|2045||Closing remarks & key takeaways|
|2100||Networking cocktails & Dinner|
Chairperson at CHiME India Chapter
- Chime Certified Healthcare CIO (CHCIO, CHIME – USA), November 2016
- CIO Certification Program, ISB Hyderabad, February 2013 on Business Innovation & Governance and Social Media
- Global CIO Certification Program, ISB Hyderabad, October 2010
- BE in Industrial & Production Engineering, Malnad College of Engineering – Hassan, Mysore University, 1988-92.
- CIO PowerList, Business Icon – Healthcare, Life Sciences & Pharma. Three successive years, 2014-15, 2015-16 and 2016-17
- 100 Most Influential Healthcare Leaders, 1st Edition of World Health & Wellness Congress, 2017
- DELL – CIO Awards, Top 10 CIOs (only one from Healthcare), 2015-16
- BSE – CIO Awards, Winner in the Healthcare & Life Sciences category, 2015