This page contains a Flash digital edition of a book.
38 | PROMOTION: XEROX |


W: edtechnology.co.uk | T: @Educ_Technology


PRINT, COPY,


Securing the multi-function printer from inside and out.


It’s strange how most of us are acutely aware of security around other technology such as the internet, tablets and smartphones but we don’t naturally have the same instinctive fears around print and copy technology. Once you recognise that the heart


(or should we say brain) of a modern photocopier or multi-function printer (MFP) is a computer, you begin to realise the importance of built-in security. Without sophisticated encryption to


protect your hard disk information, you could lay awake at night worrying about what happens to stored information when your machines are recycled. Without effective user security features, your nightmares could also feature the wrong documents going to the wrong people or simply a spiralling pit of costs for unauthorised usage. Estimates suggest that around one


in three copiers are networked; a trend that has accelerated without the full realisation that security risks have also increased. The fact that they are on a network does, of course, make them a potential security risk with the threat of being hacked because they do have an IP address and a network interface card. Nearly every digital copier, built since


2002, contains a hard drive. Like the one in your personal computer, it stores an image of every document scanned, copied or emailed by the machine. Remove the hard drive from the copier and with the help of a forensic software programme (available for free on the internet) you could run a scan that downloads the documents. You may be thinking "why do copiers and MFPs store information in the first


PRI N T STEAL?


PRI N T, CO PY


PRI N T, COP Y, S T E A L ?


place?’" In itself, that’s another kind of security feature. For instance, it can enable organisations to have a record of what’s being copied, scanned or emailed, so they can do regular checks to ensure sensitive data isn’t being wrongly acquired or distributed. Thankfully, features such as Xerox’s


Image Overwrite, electronically ‘shred’ information stored on the hard disk on their machines. For MFPs with hard drives, Xerox also offers the option of


removal of the hard drive before the MFP is disposed of, or turned in after a lease. Security solutions such as PIN number


and card enabled access help to control who can do what with copiers and MFPs, whilst biometric authentication adds another layer of security by ensuring that access can only be controlled by the individual. Of course a clear operational policy, especially for larger dispersed organisations, can help strike the balance between risk mitigation and productivity. ET


Of course, it’s easier to adopt a more security conscious mindset if you have the tools to make it simple. That’s why Xerox is helping to change behaviour by making it easy to find copier and print technology that not only meets operational and budget needs but also includes advanced security features. Visit: www.mfd-rm1599.com to see how Xerox technology can work harder for your security agenda.


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52  |  Page 53  |  Page 54  |  Page 55  |  Page 56  |  Page 57  |  Page 58  |  Page 59  |  Page 60  |  Page 61  |  Page 62  |  Page 63  |  Page 64  |  Page 65  |  Page 66  |  Page 67  |  Page 68  |  Page 69  |  Page 70  |  Page 71  |  Page 72  |  Page 73  |  Page 74  |  Page 75  |  Page 76  |  Page 77  |  Page 78  |  Page 79  |  Page 80  |  Page 81  |  Page 82  |  Page 83  |  Page 84  |  Page 85  |  Page 86