(From the editor: this blog was originally published on Channel Partner Connection)

How many times have I heard the phrase, “Ignorance is bliss?” When it comes to protecting the business documents they handle every day – or more importantly, the data contained in them – most small and medium-sized businesses (SMB) have long had the luxury of believing that hackers only targeted large corporation. Unfortunately, nothing could be further from the truth.

white Separator bar
fingerpint on phone key pad

Ponemon’s 2017 State of Cybersecurity in Small and Mid-Sized Businesses showed that a staggering 61% of companies surveyed had faced a cyber attack in the past 12 months, with 54% of these companies suffered a data breach involving employee and/or customer information. According to Small Business Computing, 58% of those data breaches occurred at small businesses.

Although the majority of SMBs still rely on paper-based processes for at least some of their core business activities, most are focused on safeguarding their PCs, laptops and servers from threats, leaving their print environment unsecured.

In fact, in the survey noted above, 38% of survey respondents said simply getting management interested in security was a challenge.

white line break separator
38% surveyed said security as a challenge

Why Document Management Spells Document Security

Today’s multifunction printers have undergone a significant transformation, with devices like Xerox® ConnectKey Technology®-enabled printers and MFPs going beyond print, fax and scan to be true workplace assistants, bringing new levels of convenience and productivity to the modern office. But like any piece of the office landscape, they require their own security considerations.

These MFPs are intelligent networked devices that require their own layer of protection from unauthorized access, and that’s just for starters. Most business owners and managers never consider things like the risk of confidential or sensitive material being left uncollected in output trays.

Document management services (DMS) from a knowledgeable, qualified partner can help mitigate these risks and help you work better with fast, cost-effective print security measures and solutions that are easy to manage.

white line break separator

Successful, Security-Focused Document Management Services in Action

1. Assess

Whether you’re a larger organization that hosts a diverse printer fleet, or a smaller customer who may have the wrong number or wrong type of devices, our first step is always to conduct an assessment. A thorough assessment determines the type and number of devices, and what security measures are already in place.

This can evaluate all points of vulnerability and helps us to build a comprehensive security plan that covers everything from information point of entry to user access and even how the device (and the sensitive information stored in it) will be disposed of at the end of its life. It’s also a great way to help our customers consolidate, upgrade, and improve their paper processes, while also cutting cost.

white line break separator

2. Protect

Part of a good DMS assessment is to ensure that the customer’s MFPs do not provide open access to the network. Our assessment will make certain that all ports are closed, and that automatic firmware and software updates are in place to ensure that each device has the latest and best possible security protection.

Every Xerox MFP comes with standard with hard drive encryption and data overwrite features to ensure that the hard drive is clear of readable data when your customer is ready to upgrade to the newest device.

white line break separator

3. Secure

MFP devices often use SSL (secure socket layer) processes to make it safe for sensitive documents to be printed over their network. Xerox takes MFP security further by including McAfee Embedded Control technology which uses application whitelisting technology to protect its devices from corrupt software and malware.

Through an alliance with Cisco, Xerox enables customers to simplify print and network infrastructure management, improve business processes results and reduce overall costs.

connectkey security diagram graphic

4. Control

By enabling access controls through secure printing, we can give our customers the peace of mind that comes from knowing only authorized users can access their MFP. Also known as PIN and pull printing, print jobs can be saved electronically on the device, or on an external server, until the authorized user is ready to print them.

Customers can decide whether to employ PIN code authentication, or another method, such as a swipe card, proximity card or fingerprint. This not only prevents unauthorized access, it also protects data security and reduces printing costs by ensuring that unclaimed documents aren’t left lying in the printer tray.

white line break separator

5. Monitor and Audit

With so much focus on protecting the device (not to mention choosing the right one), it is easy to overlook an essential part of the conversation: ongoing device monitoring. Continuous device monitoring should be a part of every customer’s workflow strategy.

Print environments are a complex mix of products and technology that becomes even more complex when users enter the mix. Our centralized print management tools can monitor and track all MFP related usage.

white line break separator

The Time for Action is Now

With security attacks becoming both increasingly sophisticated and likely to target SMBs, the time for action is now. By leveraging the expertise of a knowledgeable MPS provider, smaller organizations can rest easy knowing their data is protected at the same level and with the same expertise large corporations employ.

white line break separator