On March 4th, Konica Minolta Business Solutions U.S.A. launched a new printer/MFP security solution, the HID AU-205H GEN2 Multi Technology......
In the following February 6th post, Tuan Tran, president of HP Inc.’s Imaging, Printing and Solutions Business, discusses IDC’s latest......
The following guide published by the U.S. Federal Trade Commission outlines how enterprises can secure their copier/MFPs – noting that...
A whopping 40 percent admitted that when they found an unclaimed document in a paper tray, they not only looked at it, but made a copy.
Almost 9 out of 10 IT professionals believe a data breach will equate to 50 percent or less of annual revenue; however, actual costs could potentially range from 1 to 7 years of annual revenue
““McAfee Embedded Control ensures the integrity of systems by only allowing authorized access to devices and blocking un-authorized executables.”
While breathtaking stories such as this tend to get the headlines, many enterprises still don’t see the security risks inherent in today’s printers and MFPs.
Collabrance, a GreatAmerica IT company today announced a new cyber security offering for managed service providers. The Collabrance Master MSSP...
Ricoh notes that security threats, such as unauthorized user access and information leakage, are becoming increasingly sophisticated, and that small- and mid-size businesses often can’t afford dedicated IT administrators to combat these threats.
Canon notes that with the cost of data breaches rapidly increasing and more businesses being affected each year, it’s recognized the need to provide a security awareness resource geared toward helping customers mitigate risk.
Print is second only to the Cloud as a top IT security concern, according to the latest research from Quocirca.......
With AltaLink’s new Configuration Watchdog, IT administrators can ensure devices stay within their defined security policies to safeguard critical business data and infrastructure, without external monitoring.
Konica Minolta points out that, globally in 2017, more than 2.6 billion records were stolen, lost or exposed by hackers – this represented an increase of 88% from the year prior.
The hack works by sending an image file through the phone line — or a file that the fax machine thinks is an image file — and that is coded to contain malicious software.
The fax security vulnerability was identified by researchers at Check Point Software Technologies earlier this month.
While cloud computing presents organizations with novel opportunities, a number of new risks — including cybersecurity disclosure and General Data Protection Regulation (GDPR) compliance — make cloud solutions susceptible to unexpected security threats.