Features and tools that help protect data on MFPs and should be considered as part of your security measures include:
8 Tools To Protect The Data Flowing Through Your MFP
1 -- Image Overwrite.
The image overwrite feature electronically “shreds” information stored on the hard disk(s) of devices as part of routine job processing. The electronic erasing can be performed automatically when each print job is completed, or started manually as needed.2 -- Network Authentication and Authorization.
Access to scan, e-mail and fax features can be restricted by verifying network user names and passwords in network directories prior to use of these functions. Access permissions can be controlled on a per-user and per-service basis, while being managed centrally at the network domain controller. Additionally, all activity is closely monitored and recorded in a security audit log.
3 -- Internal Firewall and Fax/Network Separation.
MFPs should include a firewall to prevent unauthorized access to your system through the network connection. Unprotected fax connections in MFPs can be an open back door into the network, so it’s important that your machine provides complete separation of the telephone line and network fax connection.
4 -- Secure Print.
Jobs are safely stored at the MFP until the owner responsible for the document enters a personal number to release them. This controls unauthorized viewing of documents sent to the printer.
5 -- Encryption.
State-of-the-art encryption ensures all data that is traveling in and out of the MFP is unreadable. In addition, all data stored within the machine’s hard drive is encrypted. This makes files indecipherable to prying eyes.
6 -- Scan and Fax Forward.
Paper is the least secure way to manage information. Users should look to scan and digitally store documents in a trackable, secure format to reduce paper use. Fax forward to email helps limit the amount of paper left sitting in a machine.
7 -- Secure Access ID Systems.
With the use of personalized smart cards, users can program their MFPs to accommodate their specific preferences. For example, with one secure swipe of an ID card, your MFP can quickly adjust the touch-screen interface to accommodate your personal preferences, increasing ease of use, while keeping confidential information secure. Print jobs can also be sent to a virtual print queue, and using a swipe card, the print job can be retrieved from the most convenient MFP. This ensures prints are kept confidential and no documents are left waiting in the machine. Jobs that are never retrieved can be automatically deleted after a pre-determined amount of time.
8 -- Hard Drive Removal.
Some manufacturers offer options for removal of the hard drive before the MFP is disposed of or turned in after a lease. While the owner of the MFP is ultimately responsible for their data, it’s important to choose a vendor that will help you understand the risks associated with returning used machines with data stored on the hard drive. Many vendors will provide recommendations on the most effective way to rid the hard drive of information. Before disposing of old equipment, check the manufacturer’s product documentation to understand how to wipe the machine.
Businesses should work with their vendors to identify their specific security needs – determine where information resides, how it is transferred and detect the greatest areas of risk. Your print vendor can help personalize the specific security features that are most important to your individual business needs, to protect your information and keep confidential documents safe and secure.
---
By Larry Kovnat, product security manager, Xerox Corporation
This is a sort of blog we can have loads of information i would like to appreciate the intelligence of this blog's owner
Posted by: How to be an alpha male | September 16, 2010 at 07:36 AM
The link below is a CBS News investigative report about this topic:
http://www.cbsnews.com/video/watch/?id=6412572n&tag=related;photovideo
Posted by: Kevin Neal | September 19, 2010 at 06:55 PM