Top tips for securing your endpoint devices

October 3, 20172 Minute Read

Select article text below to share directly to Twitter!


The EU General Data Protection Reform (GDPR) requires businesses to implement technical and organizational measures to secure personal information and potentially notify impacted individuals and authorities if a security breach involves personal data.

With regulations constantly changing, it can prove challenging for businesses to find the time and resources to keep up. However, if they fail to offer more than a simple firewall as a guard against attacks, they could be breached and face fines that run into the millions. There’s no doubt that every business will experience a breach at some point, so it’s essential to identify when it happens and correct it as soon as possible with the right products, processes, and tools.

This checklist is a practical resource for those looking to improve their IT security, protect their brand reputation, avoid the costly consequences of a breach, and comply with strict new regulations. Starting off with the basics, work your way down this list to maximum security layers. Then, you can be confident that your endpoint security is aligned to these strict new regulations.

This handy checklist will also help your IT department secure their printer endpoints.

Basic security layer

  • Only purchase devices with built-in malware protection and encrypted hard drives.
  • Update firmware, especially versions with critical security patches—as you would when you update the apps on your mobile phone.
  • Configure device interfaces, and lock down protocols, like FTP and telnet, which are not required by your applications.
  • Review new devices and close ports or protocols not currently in use that could give intruders access.
  • Apply unique administrative passwords to each device.
  • Lock down the front panel to disable access to administration features.
  • Encrypt data flowing to and from the device.
  • Set hard disk erase procedures for old data—especially on printers you’re trading in.

Once this is complete, move onto the next layer of security.

Medium security layer

  • Integrate printer systems’ log data into your SIEM tool to fully monitor the network for threats. For new compliance regulations, visibility is key to meet the reporting requirements.
  • Deploy user authentication at the printer to track who’s copying, scanning, and faxing from the device. This data is helpful in a forensics investigation after a breach.
  • Deploy pull printing to avoid sensitive information being forgotten. This also helps your environmental standards by reducing wasted prints.

Once this is complete, move onto the final layer of security.

Advanced security layer

  • Set up job tracking and accounting reporting.
  • Consider setting and automatically enforcing rules regarding who can access and use which printers and why with role-based authorization.
  • Deploy unique digital certificates to each printer as you would other internet-connected devices on your network.
  • Deploy a managed mobile printing solution for data encryption, in-network device access, user authentication, and tracking.

Following this list of top security tips will leave your organization better protected—both in the short and long term. Stay compliant today.

  • Recommended for you
  • Recommended for You