Monitor your print fleet with these three security controls

20/09/20184 Minute Read

The growth of the Internet has offered businesses unprecedented opportunities in communication and commerce. But it’s done the same for hackers. As the devices we rely on become more intelligent, so too do the cyber-criminals who aim to exploit them. As any CISO will know, an attack can cause widespread and long-lasting damage to an organisation and the individuals responsible for its security.

A security policy that provides multiple layers of protection for each endpoint in an infrastructure is essential for businesses to properly defend themselves and ensure compliance.

Printer security is an essential part of any security policy

In a recent survey by Spiceworks, it was revealed that most organisations see printers as less of a security risk than other devices in their infrastructure. Just 16% of organisations perceive printers as a high risk for security breaches, significantly less than their perception of PCs (65%) and mobile devices (61%). And while just 57% of organisations have security practices in place for printers, a considerable 97% have security practices in place for desktops and laptops and 77% have security practices in place for mobile devices.

What many organisations don’t realise is that an unsecured printer connected to your network exposes your sensitive data—and business—to risk. As part of a deeper cyber defence strategy, security teams must continuously evaluate, identify and take swift action in response to network breach alerts across every endpoint, including printers.

With tougher sanctions for companies failing to adequately protect their data, implementing robust security policies, practices and processes is more urgent than ever.

Another EU regulation that could impact companies worldwide is the EU Network and Information Security Directive (NIS), which concerns the security of national, critical infrastructure. It requires that businesses operating in essential service sectors “must take appropriate security measures and notify serious incidents to the relevant national authority”. Organisations must implement appropriate security controls in their IT networks on every device, provide evidence of this and report any breaches. If businesses can’t see every single endpoint, they won’t be able to see and report a breach. If printers aren’t included in a security policy, a business could be found non-compliant.

Common security controls to help secure your print fleet

To help organisations make sense of recommended security steps, the Center for Internet Security has created a set of common controls that highlight the key requirements for any piece of network infrastructure, including printers.

Follow these guidelines with your printer fleet to keep your business protected and compliant as part of your wider security plan.

CSC 4: Continuous Vulnerability Assessment and Remediation

Your IT team should continuously assess the environment for vulnerability and take action to remediate on results, minimising the opportunity for breaches.

Cyber defenders have to monitor a constant stream of new information, software updates and threat bulletins, which requires significant time and resources. Only businesses viewing system logs for all devices, including printers, are able to assess their full network.

For remediation, a printer fleet security management tool that routinely checks your fleet of printers and automatically applies your security policy settings will help ease the process of maintaining fleet compliance with regulations.

CSC 6: Maintenance, Monitoring, and Analysis of Audit Logs

Your IT team should collect, manage, and analyse audit logs of events that could help detect, understand, or recover from an attack.

Un-monitored network devices can enable attackers to hide their location, malicious software, and activities. Devices like printers need to be able to feed incident details to a Security Information and Event Management (SIEM) tool through a systems log. SIEM solutions can monitor and analyse activity across your network in real time and notify administrators when incidents occur.

IT teams should choose print devices that can generate specifically “incident” syslog messages to a SIEM tool for real-time monitoring, report generation for audits and/or other compliance requirements.

CSC 8: Malware Defences

Your IT team should control the installation, spread, and execution of malicious code at multiple points in the business while optimizing the use of automation to enable rapid updating of defence, data gathering, and corrective action. They should choose print devices that will load only verified, signed code and will actively self-monitor and automatically stop attempts to load untrusted code.

Protect your company, customer and reputation with print security

A study by Spiceworks revealed that 3 in 5 organisations experienced a security breach in 2016. While 88% have a security policy in place, only 16% perceive printers as a significant threat – whereas over 60% see desktops, laptops and mobile devices as significant threats.

IT teams are busy securing servers and PCs yet hackers are now also targeting devices like printers, which often allow the same access to internal data but lack the same protection. Best practice standards, like these critical security controls, can easily be implemented as part of your multi-layer defence policy to deploy security best practices to your print fleet.


Download our CyberSecurity 2018 eGuide to find out more about upgrading your security.


Jasmine W. Gordon 27/09/2018 4 Minute Read

Security Leader Profile: HP’s Michael Howard talks print sec…

Michael Howard never stops moving. As the Head of Security Practice at HP, he divides his time between leading a global team of print security...

  1. 6

Tektonika Staff 13/09/2018 8 Minute Read

Expert tips on endpoint security: understand how to stay compliant

With 21 years under his belt, Jason O'Keeffe is one of the world's foremost experts in IT security. As lead HP Print Security Advisor, he has firsthand...

  1. 3

Tektonika Staff 24/08/2018 4 Minute Read

A quick guide to secure your PC’s and Printers for compliance

The consequences of a customer or company data breach can be catastrophic to a business of any size. The resulting damage to reputation, customer and...

Leave a Comment

Your email address will not be published. Required fields are marked *